Explore tweets tagged as #SecureKernel
株式会社SliceCheese「SecureKernel」 ホワイトハッカー出身のチームが開発する、セキュリティ認証自動取得プラットフォーム。 複数のセキュリティフレームワークへの準拠支援を、APIを用いて自動診断し設定変更をサポート。 フレームワークへの準拠を現場担当者だけで実現可能にする。 #monthlypitch
1
0
2
WinDBG is not successfully adopted to windows securekernel, because there is no KdVersionBlock inside it, but can still give useful information about modules.
1
3
43
Windows 10 20H1 securekernel can be easily analyzed in runtime using WinDBG EXDi extension and pykd plugin.
0
16
67
Windows Device Guard description and some information about securekernel internals by @BSI_Bund
https://t.co/IQgkIMBBUp
1
27
110
AIエージェントを活用したセキュリティ認証自動評価・取得プラットフォーム「SecureKernel」/Monthly Pitch! スタートアップの扉 MonthlyPitchの今月の注目4社です。二社目はこちら https://t.co/KCy9CfWZeV
0
0
1
Securekernel SkiSecureServiceTable is compacted in runtime (by SkiCompactSecureServiceTable function). Before every calling in KiSystemCall64, address of routine must be calculated. It can be deciphered in runtime using debugger:
0
2
17
Interesting difference between vmware and hyper-v: if the securekernel calls sk!SkeBugCheckEx, vmware lets it BSOD with SECURE KERNEL ERROR, while hyper-v catches it as a vmexit in the vmexit loop handler (MinimalLoop) as a REASON_EPT_VIOLATION, and reboot
0
6
28
Interesting, that hypercall names for securekernel and securekernella57.exe is different for same Windows build. It looks like that modules were written independently
0
1
10
Modules, which is loaded in Windows Server 2022 securekernel address space (SkpgBootDrivers list)
0
0
7
👀Monthly Pitch 注目のスタートアップ👀として、ピッチ内容が @thebridge_jp にも掲載されています! 株式会社SliceCheese「SecureKernel」 https://t.co/SV5uUFhU5p
0
0
3
ChatGPT analysis of Intel Processor Trace collected between Windows securekernel!SkeStartProcessor and ntkrnlmp!KeStallExecutionProcessor. A new game-changing RE and debug tool: https://t.co/oxzbAcXEcz
0
5
25
When the hypervisor sharedpage got added a month ago (see ntdll!RtlQueryPerformanceCounter), securekernel adds SkmiMapSharedUserData and more. Last month (version 10.0.17120.1), new stuff added to the sk, but still only use for query info (comes from NtQuerySystemInformation)
1
6
16
One of the attack surfaces to VSM, is of-course the interface to all the VTL1 services (implemented in securekernel!IumInvokeSecureService). In RS5, there is another one! ID==0xf7, name securekernel!SkVmSvcCall :)
0
2
20
OK guys, RS5 17661 – let’s start with the securekernel (10.0.17661.1001). So – more changes to the interface of all the VTL1 services (IumInvokeSecureService). And - lots of hotpatch mechanism functions added! New attack surface guys! :)
2
12
25
Additional runtime variables from securekernel. Windows 11 Preview build 25267
2
0
15