Cmc5410 发表于 2017-6-3 10:13

cpuz驱动漏洞 可直接加载实现进程句柄操作

本帖最后由 Cmc5410 于 2017-6-5 01:28 编辑

Vulnerable kernel drivers aren't a new thing. They allow regular uses to perform tasks that should be impossible from ring3. More specifically, theCPU-Z driver allows users to read and write directly to physical memory.

HandleMaster exploits that to perform some DKOM and change granted access rights for handles.

The idea is that you can open a handle with low access and then elevate its access rights later on when you want to use it.

This bypasses some Anti-Cheats that use ObRegisterCallbacks to strip access rights from handles at creation time cough BattleEye cough

Processor:

HandleMaster currently only supports Intel processors due to the way address translation works. I plan to add support for AMD cpus in the near future (pull requests are welcome though).
Supported Windows Versions:

Windows 7 SP1 (6.1.7601)
Windows 8 (6.2.9200)
Windows 8.1 (6.3.9600)
Windows 10 TH1 (10.0.10240)
Windows 10 TH2 (10.0.10586)
Windows 10 Anniversary Update (10.0.14393)
Windows 10 Creators Update (10.0.15063)
Any problems please let me know :)
DKOM:http://baike.baidu.com/link?url=-hu14Boa3NOpEZnWc1pOetXIC49O0kjqAVo0rZrOhA9qTBBufGDTKrakYu_CzTe0mCQI9uAKtyGQagAJIXFJPK
CPUZ:http://www.cpuid.com/softwares/cpu-z.html





lp0826 发表于 2017-6-3 18:12

一点也看不懂啊,来膜拜大佬
页: [1]
查看完整版本: cpuz驱动漏洞 可直接加载实现进程句柄操作