The presentation discusses the ETERNAL exploits, which were dumped by the Shadow Brokers and used in major cyber attacks like WannaCry and NotPetya. The talk focuses on the reverse engineering of the exploits and how they take advantage of undocumented features of the Windows kernel and SMBv1 protocol. The MS17-010 patch, which fixed the vulnerabilities, is also discussed along with additional vulnerabilities that were patched around the same time.
- ETERNAL exploits were dumped by the Shadow Brokers and used in major cyber attacks
- Exploits take advantage of undocumented features of Windows kernel and SMBv1 protocol
- Reverse engineering of the exploits is discussed
- MS17-010 patch is described and additional vulnerabilities that were patched around the same time are identified
The Equation Group, a former department at the NSA, wrote the ETERNAL exploits and the Shadow Brokers dumped them. The exploits have been used in major cyber attacks like WannaCry and NotPetya. The presentation condenses years of research into Windows internals and the SMBv1 protocol driver to explain how the exploits work. The MS17-010 patch, which fixed the vulnerabilities, is also discussed along with additional vulnerabilities that were patched around the same time.