home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.music.steely-dan      More than just a funky pair of dildos      2,181 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,107 of 2,181   
   Bulah Sadbury to All   
   Disable Patchguard Windows 81   
   03 Dec 23 18:38:35   
   
   From: bulahsadbury00@gmail.com   
      
   In this blog post we have analysed the Uroburos code that disables the old   
   Windows 7 Kernel Patch Protection, and have given overview of the new   
   Patchguard version 8 implementation. The reader should now be able to   
   understand why the attacks such as the    
   one used by Uroburos could not work with the new version of Kernel Patch   
   Protection. It seems that the new implementation of this technology can defeat   
   all known attacks. Microsoft engineers have done a great amount of work to try   
   to mitigate a class of    
   attacks .   
      
   I used this version, based on the work of Fyyre ( -tower.de/). After   
   installation on a test PC I kept an eye on outbound network traffic for a   
   while in my router (Ubiquiti Edge) and didn't see anything. Fyyre's site also   
   has Windows 7 SP1 and Windows 8    
   patchguard disablers.   
      
   Disable Patchguard Windows 81   
   Download Zip https://t.co/LmJmxKWia1   
      
      
      
   The second approach is the one I have been using so far thanks to PPLKiller. I   
   use its disablePPL sub-command to disable the protection every time I need to   
   debug a protected process for research purposes.   
      
   The option /disableLSAProtection does the same thing as /disablePPL , except   
   that it automatically retrieves the PID of the LSASS process. The target PID   
   is then passed as a parameter, along with a custom structure (more about that   
   later), to the    
   function disableProtectedProcesses(...).   
      
   The function disableProtectedProcesses() first opens the device \\.\RTCore64,   
   which is automatically created when the (64-bit) driver is loaded. It will use   
   this handle to send commands to it through the DeviceIoControl API.   
      
   To resolve this problem do the followings:-   
   1] Boot computer with the Windows XP CD-ROM in the CD-ROM drive.   
   2] To repair a Windows XP installation using Recovery Console, press R.   
   3] At the command prompt, type the following commands:-   
       
    cd \windows\system32\drivers [Press the ENTER Key]   
       
    ren ntfs.sys ntfs.old [Press the ENTER Key]   
       
    If the ntfs.sys file is there and corrupt it will rename it. If it is not   
   there then it was missing.    
       
   4]At the command prompt, type the following command, and then press ENTER:   
   copy X:\i386   
   tfs.sys drive:\windows\system32\drivers [Where X=CD-ROM Drive]   
      
   5]Remove the Windows XP CD from CD-ROM drive, type quit, and then   
   press ENTER to quit the Recovery Console.   
      
   6. Restart the system.   
      
      
       
      
      
   This allows CosmicStrand to gain hold of the execution once the Windows NT   
   kernel starts and disable the PatchGuard, which is specifically designed to   
   prevent any modifications in the Windows NT kernel.   
      
      
      
   Driver Signature Enforcement is part of Windows Code Integrity (CI) and,   
   depending on the Windows build version, it is located in ntoskrnl.exe or   
   CI.dll as a global non-exported variable (flag). Before Windows 8 build 9600,   
   the DSE flag is located in    
   ntoskrnl.exe as nt!g_CiEnabled, which is a global boolean variable toggling   
   DSE either enabled or disabled. In any other more recent builds, the DSE flag   
   can be found in CI.dll as CI!g_CiOptions, which is a combination of flags   
   (0x0=disabled, 0x6=enabled,   
    0x8=test mode).   
      
   In a nutshell, the idea is to (ab)use a vulnerable signed driver with an   
   arbitrary kernel memory read/write exploit, locate either the g_CiEnabled or   
   g_CiOptions variables in kernel memory and overwrite the value with 0x0 to   
   disable DSE using the    
   vulnerable driver. Once DSE is disabled, the malicious driver can be loaded,   
   after which the DSE value should be restored as soon as possible, because DSE   
   is protected by PatchGuard. Sounds relatively straightforward you might say,   
   however the hard part    
   is locating g_CiEnabled or g_CiOptions, because even though we know where to   
   go looking, they are not exported so we will need to perform offset   
   calculations.   
      
   I doubt that Microsoft has hardcoded the list of AntiViruses somewhere and   
   decides which processes should get this flag based on the certificate, so how   
   does windows decide which processes should get this flag?   
      
   In April 2019, the Norton 360 brand was revived to replace Norton Security,   
   adding Norton Secure VPN, 10 GB of online backup per-user, as well as premium   
   plans incorporating LifeLock identity theft protection.[29][30]Additional   
   features have been added    
   to the Norton 360 product line, including a specific suite of tools for gaming   
   in 2021,[31] and social media monitoring services in February 2022.[32]Norton   
   360 won three categories in AV-TEST Institute's 2021 Awards, for Best   
   Protection and Best    
   Performance for Windows Home, MacOS security, and Android security for   
   consumer use.[33] In January 2022, Norton installed a cryptominer that would   
   mine Ethereum once activated by the user; the feature was permanently disabled   
   in September of that year.[   
   34]   
      
   Norton 360 software is not sold; it is a purchased subscription for a stated   
   period (e.g. one year). The software (e.g. firewall, antivirus) is   
   automatically disabled at the end of the subscription period, unless a new   
   subscription is purchased.   
      
   Taking my cues from Abatchy, I decided to try and bypass SMEP by using a   
   well-known ROP chain technique that utilizes segments of code in the kernel to   
   disable SMEP and then heads to user space to call our shellcode.   
    eebf2c3492   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca