You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We will also use the previous PoC with the `GetLastError()`. The idea here is to:
1112
1201
- Encrypt / Decrypt the shellcode with the masterkey.
@@ -1579,7 +1668,7 @@ We will be now using a different approach, mimicking how the windows kernel itse
1579
1668
>
1580
1669
> - While the names of variables in a C struct might change or be renamed in a new SDK (at compilation time), the binary offset (like `0x60` for the PEB or `0x18` for the LDR) is a hardcoded constant in the Windows Kernel's own source code. If we take a look at the dissasembly of any internal Windows function that accesses the PEB, we will see instructions like `mov rax, gs:[60h]`, `mov rax, [rax+18h]`.
1581
1670
>
1582
-
> - These are the exact raw offsets we will use in our new mathematical PEB walk. The kernel doe snot know the name Ldr, it only knows that the pointer it needs is 24 bytes (`0x18`) from the start of the PEB.0
1671
+
> - These are the exact raw offsets we will use in our new mathematical PEB walk. The kernel doe snot know the name Ldr, it only knows that the pointer it needs is 24 bytes (`0x18`) from the start of the PEB.
1583
1672
1584
1673
Here is an additional explanation of the code, before we move into the full sample:
0 commit comments