<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kernel on Matt Suiche</title><link>https://www.msuiche.com/categories/kernel/</link><description>Recent content in Kernel on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 14 Oct 2024 12:00:00 +0200</lastBuildDate><atom:link href="https://www.msuiche.com/categories/kernel/index.xml" rel="self" type="application/rss+xml"/><item><title>Bob and Alice in Kernel-land - Part 3</title><link>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land-part-3/</link><pubDate>Mon, 14 Oct 2024 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land-part-3/</guid><description>&lt;p&gt;&lt;p class="markdown-image"&gt;
 &lt;img src="images/1728963981396.jpeg" alt="BSOD" /&gt;
&lt;/p&gt;&lt;/p&gt;
&lt;p&gt;This is the last part of a 3-part series on Bob and Alice in Kernel-land. You can find &lt;a href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/" target="_blank" rel="noopener"&gt;Part 1 here&lt;/a&gt; and &lt;a href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land-part-2/" target="_blank" rel="noopener"&gt;Part 2 here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CrowdStrike podcast &amp;ldquo;&lt;a href="https://www.crowdstrike.com/resources/adversary-universe-podcast/" target="_blank" rel="noopener"&gt;Adversary Universe Podcast&lt;/a&gt;&amp;rdquo; just released a new episode entitled &amp;ldquo;&lt;a href="https://open.spotify.com/episode/4aeIXlyqYeAcaKIdwA0354?si=0d1060dbbcf94880" target="_blank" rel="noopener"&gt;The Kernel&amp;rsquo;s Essential Role in Cybersecurity Defense&lt;/a&gt;&amp;rdquo; featuring Adam Myers w/ Alex Ionescu, who is the original architect of the CrowdStrike Falcon kernel agent and also known for being the co-author of &amp;ldquo;Windows Internals&amp;rdquo; book and to be among the most knowledgeable people when it comes to understanding how the Windows (or any other OS tbh) kernel works.&lt;/p&gt;</description></item><item><title>Bob and Alice in Kernel-land - Part 2</title><link>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land-part-2/</link><pubDate>Fri, 23 Aug 2024 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/bob-and-alice-in-kernel-land-part-2/</guid><description>&lt;p&gt;&lt;p class="markdown-image"&gt;
 &lt;img src="./images/main.webp" alt="Hacker Man" /&gt;
&lt;/p&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s been a month since I wrote &lt;a href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/" target="_blank" rel="noopener"&gt;Part 1 of &amp;ldquo;Bob and Alice in Kernel-land&amp;rdquo;&lt;/a&gt;. As expected, we saw &lt;a href="https://arstechnica.com/information-technology/2024/08/crowdstrike-unhappy-with-shady-commentary-from-competitors-after-outage/" target="_blank" rel="noopener"&gt;minimal&lt;/a&gt; constructive feedback from vendors, with a few notable exceptions. Sophos &lt;a href="https://news.sophos.com/en-us/2024/08/01/driving-lessons-the-kernel-drivers-in-sophos-intercept-x-advanced/" target="_blank" rel="noopener"&gt;provided the most detailed information about their drivers&lt;/a&gt;, while CrowdStrike &lt;a href="https://www.crowdstrike.com/blog/tech-analysis-kernel-access-security-architecture/" target="_blank" rel="noopener"&gt;offered valuable insights&lt;/a&gt; into their kernel architecture, including the use of &lt;a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/network/introduction-to-winsock-kernel" target="_blank" rel="noopener"&gt;Microsoft&amp;rsquo;s Winsock kernel file transfer&lt;/a&gt;. This feature, introduced in Windows Vista+, was designed to replace the outdated Transport Driver Interface (TDI). It&amp;rsquo;s reasonable to assume that the existence of this capability has significantly contributed to more operations being moved to kernel mode, as leveraging TDI posed considerable challenges without compromising stability.&lt;/p&gt;</description></item></channel></rss>