NoFilter Attack: Unveiling Privilege Escalation through Windows Filtering Platform (WFP)

The cybersecurity world has been taken aback by the discovery of a previously undetected attack method known as NoFilter. This sophisticated technique exploits the Windows Filtering Platform (WFP) to achieve privilege escalation in the Windows operating system, raising serious concerns about system security. In this article, we delve into the intricacies of the NoFilter attack, explore its implications, and emphasize the importance of continually examining built-in components like WFP to uncover new attack vectors.

Overview of the NoFilter Attack Method

The NoFilter attack method has emerged as a highly effective means of privilege escalation within the Windows OS. By skillfully manipulating the WFP, threat actors can escalate privileges from admin to SYSTEM level, granting them extensive control over the compromised system. This newfound attack method poses a significant threat to the security of Windows-based systems.

Research Methodology

The research that uncovered NoFilter began with the utilization of an in-house tool called RPC Mapper, which enabled cybersecurity experts to map remote procedure call (RPC) methods. Armed with this understanding, researchers proceeded to investigate the inner workings of the Windows Filtering Platform.

The researchers utilized the RPC Mapper tool as a starting point for their in-depth analysis. This tool provided them with crucial insights into the architecture and functionality of RPC methods, ultimately leading to the discovery of the NoFilter attack technique.

The Windows Filtering Platform serves as a crucial component of the Windows operating system. By processing network traffic and facilitating the configuration of filters that allow or block communications, WFP plays a vital role in securing network connections. However, it is within this seemingly innocuous framework that the NoFilter attack method thrives.

Understanding the Windows Filtering Platform (WFP)

To fully comprehend the mechanics of the NoFilter attack, it is essential to gain a thorough understanding of WFP and its inner workings.

The Windows Filtering Platform (WFP) acts as a set of APIs and system services responsible for processing network traffic and implementing filters. These filters control the behavior of network connections by permitting or blocking specific types of communication.

A key element in the NoFilter attack involves retrieving the handle table of another process. This retrieval is made possible through the use of a function called NtQueryInformationProcess, which allows the attacker to gain access to handle tables that would otherwise be inaccessible.

Access tokens are used to identify the user involved when privileged tasks are executed. Remarkably, a piece of malware running in user mode can exploit specific functions to access tokens from other processes. This vulnerability becomes a powerful tool in the hands of a threat actor seeking to escalate privileges.

Exploiting WFP for Privilege Escalation

With a deep understanding of the Windows Filtering Platform and the intricate details of access token exploitation, attackers can exploit WFP to achieve stealthy and evasive privilege escalation.

The NoFilter attack method can be further enhanced by modifying it to perform kernel duplication through the leverage of WFP. This modification enhances the evasiveness and stealthiness of the attack, making it even more challenging to detect and mitigate.

By combining the handle table retrieval technique and access token exploitation, a threat actor utilizing the NoFilter attack can effortlessly launch a new console session, effectively impersonating a privileged user, such as “NT AUTHORITYSYSTEM,” or any logged-in user. This stealthy and evasive privilege escalation can enable actors to gain unprecedented control over the compromised system.

Implications of the NoFilter Attack

The NoFilter attack carries several implications that significantly exacerbate the risks associated with system security.

One of the most alarming aspects of the NoFilter attack is the ability to launch new console sessions under the guise of “NT AUTHORITYSYSTEM” or any other logged-in user. This level of privilege significantly empowers threat actors and grants them unrestricted access to critical system resources.

With the NoFilter attack method, cybercriminals can effectively bypass existing security measures and gain control over a system from an elevated privilege position. This presents a new level of risk as it circumvents traditional security mechanisms and opens doors to a wide range of malicious activities.

The discovery of the NoFilter attack highlights the critical importance of examining built-in components within operating systems. By scrutinizing components like the Windows Filtering Platform, novel attack vectors can be identified, leading to the development of more effective countermeasures.

Discovering New Attack Vectors

It is imperative for security researchers and professionals to continuously investigate built-in components to uncover previously unknown vulnerabilities. The NoFilter attack serves as a stark reminder that threats can emerge from unexpected sources, necessitating proactive efforts to stay ahead of cybercriminals.

The Windows Filtering Platform, despite its vital role in network security, has been exploited in the NoFilter attack. This underscores the need for dedicated research and continuous assessment of such components to fortify system defenses and protect against emerging threats.

Other Recent Security Concerns

In addition to the NoFilter attack, recent revelations by the cybersecurity firm SafeBreach have shed light on other critical security concerns affecting Windows systems.

SafeBreach has disclosed novel approaches that threat actors can exploit to encrypt files without executing code on targeted endpoints, using cloud-based ransomware. Furthermore, the techniques explored neutralize Windows Defender Endpoint Detection and Response (EDR) agents, rendering them ineffective in detecting and responding to threats.

Another alarming revelation focuses on the ability of threat actors to remotely delete entire databases from fully patched servers. This exposes the vulnerabilities inherent in even the most robust security measures.

The discovery of the NoFilter attack method serves as a wake-up call to the significance of continuously researching and exploring security vulnerabilities. The ability to exploit built-in components, such as the Windows Filtering Platform, requires a constant and comprehensive evaluation of system defenses. Cybersecurity professionals must remain vigilant, evolving alongside emerging threats to safeguard digital environments and protect critical infrastructure.

Explore more