Explore tweets tagged as #SecureKernel
@monthlypitch
Monthly Pitch
1 month
株式会社SliceCheese「SecureKernel」 ホワイトハッカー出身のチームが開発する、セキュリティ認証自動取得プラットフォーム。 複数のセキュリティフレームワークへの準拠支援を、APIを用いて自動診断し設定変更をサポート。 フレームワークへの準拠を現場担当者だけで実現可能にする。 #monthlypitch
1
0
2
@gerhart_x
Arthur "Gerhart" Khudyaev
6 years
WinDBG is not successfully adopted to windows securekernel, because there is no KdVersionBlock inside it, but can still give useful information about modules.
1
3
43
@gerhart_x
Arthur "Gerhart" Khudyaev
5 years
Windows 10 20H1 securekernel can be easily analyzed in runtime using WinDBG EXDi extension and pykd plugin.
0
16
67
@gerhart_x
Arthur "Gerhart" Khudyaev
5 years
Windows Device Guard description and some information about securekernel internals by @BSI_Bund https://t.co/IQgkIMBBUp
1
27
110
@saqer_one
SAQER
2 months
【解説資料無料ダウンロード】��産省「サプライチェーン強化に向けたセキュリティ対策評価制度」早わかりガイドを無料公開 https://t.co/gKvIBUR6ta
0
1
5
@kigoyama
kigoyama@BRIDGE
21 days
AIエージェントを活用したセキュリティ認証自動評価・取得プラットフォーム「SecureKernel」/Monthly Pitch! スタートアップの扉 MonthlyPitchの今月の注目4社です。二社目はこちら https://t.co/KCy9CfWZeV
0
0
1
@gerhart_x
Arthur "Gerhart" Khudyaev
5 years
Securekernel SkiSecureServiceTable is compacted in runtime (by SkiCompactSecureServiceTable function). Before every calling in KiSystemCall64, address of routine must be calculated. It can be deciphered in runtime using debugger:
0
2
17
@sunnyc7
Sunny
5 years
Am I doing this right ? #HVCI #SecureKernel
0
0
1
@AmarSaar
Saar Amar
7 years
Interesting difference between vmware and hyper-v: if the securekernel calls sk!SkeBugCheckEx, vmware lets it BSOD with SECURE KERNEL ERROR, while hyper-v catches it as a vmexit in the vmexit loop handler (MinimalLoop) as a REASON_EPT_VIOLATION, and reboot
0
6
28
@gerhart_x
Arthur "Gerhart" Khudyaev
4 years
Interesting, that hypercall names for securekernel and securekernella57.exe is different for same Windows build. It looks like that modules were written independently
0
1
10
@realmidi12
midi12
4 years
RtlAcquireSRWLockShared inlined all over securekernel.exe
0
0
0
@gerhart_x
Arthur "Gerhart" Khudyaev
3 years
Modules, which is loaded in Windows Server 2022 securekernel address space (SkpgBootDrivers list)
0
0
7
@monthlypitch
Monthly Pitch
21 days
👀Monthly Pitch 注目のスタートアップ👀として、ピッチ内容が @thebridge_jp にも掲載されています! 株式会社SliceCheese「SecureKernel」 https://t.co/SV5uUFhU5p
0
0
3
@gerhart_x
Arthur "Gerhart" Khudyaev
3 months
WinDBG can show modules, that loaded in securekernel address space, with 'lm' command. No need to use separate python script for viewing it.
@gerhart_x
Arthur "Gerhart" Khudyaev
3 years
Securekernel runtime from Windows Server 2022 with May 2022 patches (data was gotten using WinDBG Hyper-V EXDi plugin)
1
0
9
@AlanSguigna
Alan Sguigna
7 months
ChatGPT analysis of Intel Processor Trace collected between Windows securekernel!SkeStartProcessor and ntkrnlmp!KeStallExecutionProcessor. A new game-changing RE and debug tool: https://t.co/oxzbAcXEcz
0
5
25
@AmarSaar
Saar Amar
8 years
When the hypervisor sharedpage got added a month ago (see ntdll!RtlQueryPerformanceCounter), securekernel adds SkmiMapSharedUserData and more. Last month (version 10.0.17120.1), new stuff added to the sk, but still only use for query info (comes from NtQuerySystemInformation)
1
6
16
@AmarSaar
Saar Amar
8 years
One of the attack surfaces to VSM, is of-course the interface to all the VTL1 services (implemented in securekernel!IumInvokeSecureService). In RS5, there is another one! ID==0xf7, name securekernel!SkVmSvcCall :)
0
2
20
@AmarSaar
Saar Amar
8 years
OK guys, RS5 17661 – let’s start with the securekernel (10.0.17661.1001). So – more changes to the interface of all the VTL1 services (IumInvokeSecureService). And - lots of hotpatch mechanism functions added! New attack surface guys! :)
2
12
25
@gerhart_x
Arthur "Gerhart" Khudyaev
3 years
Additional runtime variables from securekernel. Windows 11 Preview build 25267
2
0
15