티스토리 뷰
Someone had been asking how to hook ZwShutdownSystem, the only problem being the function is exported by ntdll, not ntoskrnl. metro_mystery was helpful in providing the table entry number for the call, but unfortunately, the entry number would have to have been hardcoded into the driver. Fortunately, getting the id dynamically from a user land component is easy, simply do it the same way we always do :)
77F5B438 B8 00000000 MOV EAX, _FUNCTION_ID_
77F5B43D BA 0003FE7F MOV EDX,7FFE0300
77F5B442 FFD2 CALL EDX
77F5B444 C2 1800 RETN XX
increment the function by one. (for the mov eax part of the instruction) I have included a sample application in my vault for anyone interested. If you dont care about using a userland component in your rootkit, then just have the userland app send the rootkit an ioctl after installing it, giving it the function id's it needs. If you don't like userland applications, just use KeAttachProcess() to any process that has ntdll loaded, get the base ntdll through the PEB_LDR_DATA in the PEB, and then just make your own GetProcAddress() function.
I'm sure someone will say this article is simplistic, and unnecessary considering everyone already knows how to get the table entry number for kernel level procs, to which I say I just thought some people might find this useful. If you found it useful, great, if you didn't, great.
'보안 > 분석' 카테고리의 다른 글
struct _PEB for XP (0) | 2008.03.26 |
---|---|
struct _RTL_USER_PROCESS_PARAMETERS for XP (0) | 2008.03.26 |
NTSTATUS PspCreateProcess(...) (0) | 2008.03.25 |
NTSTATUS PsCreateSystemProcess(...) (0) | 2008.03.25 |
ntoskrnl.exe - Exports (0) | 2008.03.24 |
- Total
- Today
- Yesterday
- 지루박멸연구센타
- 열정의 힘을 믿는다
- Le4rN TO Cr4cK
- 디버깅에관한모든것(DebugLab)
- sysinternals
- FoundStone
- hashtab
- 보안-coderant
- 디바이스드라이버 개발자 포럼
- dualpage.muz.ro
- osronline.com - 드라이버 관련 정보 사이트
- NtInternals - NativeAPI Refere…
- pcthreat - spyware 정보 제공
- rootkit.com - 루트킷 관련 정보
- www.ntinternals.net
- WINE CrossRef. - source.winehq…
- tuts4you
- hex-rays
- idapalace
- idefense
- immunityinc
- threatexpert
- hdp.null2root.org
- www.crackstore.com
- crackmes.de
- www.who.is
- www.cracklab.ru
- community.reverse-engineering.…
- video.reverse-engineering.net
- SnD
- 클레이 키위
- reversengineering.wordpress.co…
- www.openrce.org
- www.woodmann.com
- PEID.Plusins.BobSoft
- roxik.com/pictaps/
- regexlib.com
- spyware-browser.com
- www.usboffice.kr
- regulator
- www.txt2re.com
- ietab.mozdev.org
- zesrever.xstone.org
- www.heaventools.com/PE-file-he…
- www.heaventools.com
- www.innomp3.com
- 울지않는벌새
- exetools.com-forum
- exetools.com
- utf8 conv
- robtex - IP trace
- onsamehost - same IP sites
- JpopSuki
- jsunpack.jeek.org
- wepawet.iseclab.org
- www.jswiff.com
- www.hackeroo.com
- winesearcher.co.kr
- khpga.org
- malwareurl.com
- anubis.iseclab.org
- www.crummy.com-eautifulSoup
- malwarebytes.org/forums
- bbs.janmeng.com
- blackip.ustc.edu.cn
- eureka.cyber-ta.org
- exploit-db.com
- 공공인프라
- SBI저축은행
- ChatGPT
- 자동트래이딩
- systemd
- 주식트래이딩
- 시스템트래이딩
- 신한저축은행
- 피봇
- 주택구매력지수
- 주식
- 다올저축은행
- ROA
- 사회간접자본
- INVOICE
- hai
- 매매가격지수
- PIR
- 전세매매지수
- CriticalSection
- ElasticSearch
- Pivot
- O365
- 실시간트래이딩
- 군함도
- 레고랜드
- 미국주식
- ubuntu
- logrotate
- 맥쿼리인프라
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 | 31 |