Sunday, July 29, 2012

The Subway Line 8 - Exploitation of Windows 8 Metro Style Apps

Luckily, this year we had a chance to again present our research in Black Hat USA. Nanika did really great researches on Windows 8 Metro style apps. In this presentation we not only discuss the methodology of AppContainer sandbox (application sandbox with Metro style apps) bypassing, we also disclose some issues/problems that we found during the testing.

Abstract of the presentation:
Windows 8 introduces lots of security improvements; one of the most interesting features is the Metro-style app. It not only provides fancy user interface, but also a solid application sandbox environment. All Metro-style applications run in AppContainer, and the AppContainer sandbox isolates the execution of each application. It can make sure that an App does not have access to capabilities that it hasn't declared and been granted by the user.This presentation will introduce the design of Metro-style app as well as AppContainer sandbox. We will dive into details of the architecture and see how it works, how does it protect from a malicious App attack. After reviewing the design, we are going to look for possible attack vectors to bypass the sandbox. Analysis will start from low level to high level. We will describe how we find the target to attack, and how we do analyze in different layers, such as debug of APLC, COM server attack, WinRT API fuzzing, and logic flaw discovery. Not only the methodology, we will also demonstrate some problems we have discovered, including tricks to bypass AppContainer to access files, launch program, and connect to Internet.


And here is the slides:
Blackhat USA 2012 - The Line 8 Subway - Exploitation of Windows 8 Metro Style App (Slides)

The demo video:


The paper:
Blackhat USA 2012 - The Line 8 Subway - Exploitation of Windows 8 Metro Style App (Paper)


Nanika & TT