티스토리 뷰
Someone had been asking how to hook ZwShutdownSystem, the only problem being the function is exported by ntdll, not ntoskrnl. metro_mystery was helpful in providing the table entry number for the call, but unfortunately, the entry number would have to have been hardcoded into the driver. Fortunately, getting the id dynamically from a user land component is easy, simply do it the same way we always do :)
77F5B438 B8 00000000 MOV EAX, _FUNCTION_ID_
77F5B43D BA 0003FE7F MOV EDX,7FFE0300
77F5B442 FFD2 CALL EDX
77F5B444 C2 1800 RETN XX
increment the function by one. (for the mov eax part of the instruction) I have included a sample application in my vault for anyone interested. If you dont care about using a userland component in your rootkit, then just have the userland app send the rootkit an ioctl after installing it, giving it the function id's it needs. If you don't like userland applications, just use KeAttachProcess() to any process that has ntdll loaded, get the base ntdll through the PEB_LDR_DATA in the PEB, and then just make your own GetProcAddress() function.
I'm sure someone will say this article is simplistic, and unnecessary considering everyone already knows how to get the table entry number for kernel level procs, to which I say I just thought some people might find this useful. If you found it useful, great, if you didn't, great.
'보안 > 분석' 카테고리의 다른 글
struct _PEB for XP (0) | 2008.03.26 |
---|---|
struct _RTL_USER_PROCESS_PARAMETERS for XP (0) | 2008.03.26 |
NTSTATUS PspCreateProcess(...) (0) | 2008.03.25 |
NTSTATUS PsCreateSystemProcess(...) (0) | 2008.03.25 |
ntoskrnl.exe - Exports (0) | 2008.03.24 |
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- hai
- 전세매매지수
- 주택구매력지수
- 시스템트래이딩
- 레고랜드
- ElasticSearch
- PIR
- Pivot
- O365
- 군함도
- SBI저축은행
- 미국주식
- ubuntu
- 주식트래이딩
- 실시간트래이딩
- 주식
- CriticalSection
- 사회간접자본
- ROA
- 피봇
- logrotate
- 매매가격지수
- 신한저축은행
- 다올저축은행
- 자동트래이딩
- 맥쿼리인프라
- INVOICE
- systemd
- ChatGPT
- 공공인프라
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |