All Projects → mathisvickie → KMAC

mathisvickie / KMAC

Licence: other
Some usefull info when reverse engineering Kernel Mode Anti-Cheat

Programming Languages

C++
36643 projects - #6 most used programming language

Projects that are alternatives of or similar to KMAC

KDBG
The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI; the command line interface for the driver. It originated due to insufficient useability with CheatEngine's DBVM driver while debugging games running under certain AntiCheat software.
Stars: ✭ 28 (-9.68%)
Mutual labels:  kernel, driver, anticheat
Pubg Pak Hacker
use windows kernel deriver hidden file and itself to Bypass BE
Stars: ✭ 157 (+406.45%)
Mutual labels:  kernel, driver
Awesome Windows Security Development
awesome-windows-security-development
Stars: ✭ 154 (+396.77%)
Mutual labels:  kernel, driver
Ksocket
KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK
Stars: ✭ 183 (+490.32%)
Mutual labels:  kernel, driver
Deos
The distributed exokernel operating system
Stars: ✭ 80 (+158.06%)
Mutual labels:  kernel, driver
Windows Kernel Explorer
A free but powerful Windows kernel research tool.
Stars: ✭ 1,299 (+4090.32%)
Mutual labels:  kernel, driver
Garhal csgo
A project that demonstrates how to screw with CSGO from Kernel Space. (CSGO Kernel Cheat/Hack) All cleaned up, and with updated offsets.
Stars: ✭ 179 (+477.42%)
Mutual labels:  kernel, driver
Winspd
Windows Storage Proxy Driver - User mode disk storage
Stars: ✭ 335 (+980.65%)
Mutual labels:  kernel, driver
Wmi Static Spoofer
Spoofing the Windows 10 HDD/diskdrive serialnumber from kernel without hooking
Stars: ✭ 199 (+541.94%)
Mutual labels:  kernel, driver
dr checker 4 linux
Port of "DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers" to Clang/LLVM 10 and Linux Kernel
Stars: ✭ 34 (+9.68%)
Mutual labels:  kernel, kernel-driver
Prevent Process Creation
Record & prevent process creation in kernel mode
Stars: ✭ 31 (+0%)
Mutual labels:  driver, kernel-driver
Ntphp
Ever wanted to execute PHP in your kernel driver? Look no further!
Stars: ✭ 76 (+145.16%)
Mutual labels:  kernel, driver
Hidden
Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc
Stars: ✭ 768 (+2377.42%)
Mutual labels:  kernel, driver
Hacksysextremevulnerabledriver
HackSys Extreme Vulnerable Windows Driver
Stars: ✭ 1,330 (+4190.32%)
Mutual labels:  kernel, driver
Pplkiller
Protected Processes Light Killer
Stars: ✭ 453 (+1361.29%)
Mutual labels:  kernel, driver
Ioctlbf
Windows Kernel Drivers fuzzer
Stars: ✭ 170 (+448.39%)
Mutual labels:  kernel, driver
fix-linux-mouse
Hints how to fix USB mouse issues on Linux
Stars: ✭ 36 (+16.13%)
Mutual labels:  kernel, driver
Razer Laptop Control
Project to create driver/software to control performance of razer laptops
Stars: ✭ 268 (+764.52%)
Mutual labels:  kernel, driver
Winfsp
Windows File System Proxy - FUSE for Windows
Stars: ✭ 4,071 (+13032.26%)
Mutual labels:  kernel, driver
Vulnerable Kext
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Stars: ✭ 188 (+506.45%)
Mutual labels:  kernel, driver

KMAC

KernelMode AntiCheat

Just to see of what you should be aware when dealing with KMAC on Windows.

Many people are fighting with KMAC in ring0 and its cool to have some vulnerable signed driver that opens for you a door to windows kernel. You may either try to exploit some CVE: https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=driver or find yourself a 0-day which is not that easy but it's less detectable by anticheats. Here is a nice tool which enumerates x64 driver imports: https://gist.github.com/adrianyy/9c481c9b3b115a910985ce310d948534 I will add archive with some publicly well known drivers (signed & vulnerable), password for extraction is just simply 'password'. Nice talk about vulnerable drivers: https://eclypsium.com/2019/08/10/screwed-drivers-signed-sealed-delivered/

Looks like in ci.dll are some undocumented structures that leave some traces about (un)loaded drivers, see this: https://github.com/TheCruZ/kdmapper/blob/master/kdmapper/intel_driver.cpp#L626 https://key08.com/index.php/2021/02/06/902.html

about BE see: https://secret.club/

Recently I dived into EAC (working on game Enlisted because its cool & free2play) and it looks like game calls eac.dll!CreateGameClient to get this interface. To note: real interface is larger but Enlisted does not use those functions after offset 0x50 (also doesnt use 0x30, 0x38, 0x40 and 0x48 vfuncs)

Blacklisted

Most likely all vulnerable drivers in 'git' directory inside that huge zip are blacklisted by popular anticheats (avoid using all versions of them).

100% blacklist by f4ceit and v4nguard:

  • winring
  • msio64
  • ene
  • inpoutx64
  • glckio2
  • ntiolib_x64
  • asio

V4nguard is scanning for this devices (i bet 4 bl4cklist -> b4n):

  • \Device\ATSZIO
  • \Device\genericdrv
  • \DosDevices\AIDA64Driver
  • \DosDevices\ALSysIO
  • \DosDevices\AsUpdateio
  • \DosDevices\Asusgio
  • \DosDevices\BS_Def
  • \DosDevices\CITMDRV
  • \DosDevices\EneTechIo
  • \DosDevices\GLCKIo2
  • \DosDevices\Global\CPUZ
  • \DosDevices\HOSTNT
  • \DosDevices\NTIOLib
  • \DosDevices\NVFLASH
  • \DosDevices\RTCore
  • \DosDevices\SE64
  • \DosDevices\WinIoB
  • \DosDevices\WinRing0
  • \DosDevices\ZemanaAntiMalware
  • \DosDevices\driveragent%d
  • \DosDevices\inpout

CVEs

As you may see many known bad drivers are blacklisted by BE/EAC and others because they were already used in public game cheats (and released on uc). Here are listed most recent interesting CVEs: (i will try to keep this list updated)

CVE-2021-36276 (dbutil version2)

Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. Note: it is WDF driver so I won't make any PoC - feel free to analyze it, search for imports MmMapIoSpace and MmUnmapIoSpace.

CVE-2021-31728 & CVE-2021-31727 (zemana again)

Not recommended to use because zemana was already detected in past even if these are new CVEs. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31728 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31727 POC: https://github.com/irql0/CVE-2021-31728

CVE-2021-28685 (AsIO2_64.sys + AsIO2_32.sys)

Looks like this is second version of infamous AsIO and they just can't learn from own mistakes. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28685 //todo: more info

CVE-2021-27965 (MsIo64.sys)

For PoC see: https://github.com/mathisvickie/CVE-2021-27965

CVE-2021-21551 (dbutil_2_3.sys)

Local Privilege Escalation to nt authority/system PoC: https://github.com/mathisvickie/CVE-2021-21551

CVE-2020-0796 aka SMBGhost

RCE in microsoft SMB v3 protocol (when using compression) which can be used on localhost or remotely on LAN (arbitrary kernel memory read/write). Exploiting requires Windows10 1903 or 1909. Advantage is that nothing suspicious is running on target system because attack vector is network and bug happens in srv2.sys - microsoft windows file. See POC: https://github.com/ZecOps/CVE-2020-0796-LPE-POC (write_what_where - write arbitrary kernel memory over local network)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].