Using ALPC security features to compromise RPC services

WanJunJie Zhang, Yisheng He

DEF CON 32 Main Stage · Day 1 · Main Stage

In this DEF CON 32 talk, security researcher WanJunJie Zhang, from Hillstone Networks, delved into the intricacies of inter-process communication mechanisms within the Windows operating system, specifically **Lightweight Procedure Call (LPC)** and **Remote Procedure Call (RPC)**. The presentation aimed to shed light on their shared architecture, common vulnerabilities, and critically, how novel security flaws can be exploited to bypass robust Windows security mitigations such as **Address Space Layout Randomization (ASLR)**, **Data Execution Prevention (DEP)**, and **Control Flow Guard (XFG)**, ultimately leading to a system shell.

AI review

This talk presents a critical examination of Windows inter-process communication mechanisms, specifically LPC and RPC, claiming to identify novel vulnerabilities that can bypass core security mitigations like ASLR, DEP, and XFG to achieve a system shell. The implications for any organization operating Windows environments are profound, challenging fundamental assumptions about platform security and demanding immediate attention to patching strategies, robust path validation, and advanced detection capabilities. This isn't just a technical deep dive; it's a direct challenge to a CISO's…

Watch on YouTube