A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title “Windows Downdate: Downgrade Attacks Using Windows Updates”.
Using Windows Downdate you can downgrade critical OS components, DLLs, Drivers, the NT kernel, the Secure Kernel, the Hyper-V hypervisor, Credential Guard and much more!
To install Windows Downdate, follow the steps below.
python311 setup.py install
Windows Downdate also supports PyInstaller pre-compiled binary that you can download here
Windows Downdate operates on a config XML file that specifies the files to downgrade
windows_downdate.py --config-xml <CONFIG XML PATH> <ADDITIONAL ARGS>
<Configuration>
<UpdateFilesList>
<UpdateFile source="path\to\source.exe" destination="path\to\destination.exe" />
</UpdateFilesList>
</Configuration>
<Configuration>
: The root element that encapsulates the entire configuration.
<UpdateFilesList>
: A container element that holds one or more elements.
<UpdateFile>
: Defines a single file downgrade operation.
source
: The path of the downgrade source file. Note that if the source file does not exist, Windows Downdate attempts to retrieve its base version from the component store.
destination
: The path of the downgrade destination file.
Simply put – take the XML snippet and insert <UpdateFile>
elements, the source
replaces the destination
.
You can also refer to the examples directory as reference for finalized config XML files.
Windows Downdate supports two execution options.
Windows Downdate supports crafting custom downgrades. To craft custom downgrade, you need to create a config XML file and just feed the tool with this config XML.
Windows Downdate has built-in usage examples with ready config XML files and vulnerable modules. The supported usage examples are listed below.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…