cpuz驱动漏洞 可直接加载实现进程句柄操作
本帖最后由 Cmc5410 于 2017-6-5 01:28 编辑Vulnerable kernel drivers aren't a new thing. They allow regular uses to perform tasks that should be impossible from ring3. More specifically, theCPU-Z driver allows users to read and write directly to physical memory.
HandleMaster exploits that to perform some DKOM and change granted access rights for handles.
The idea is that you can open a handle with low access and then elevate its access rights later on when you want to use it.
This bypasses some Anti-Cheats that use ObRegisterCallbacks to strip access rights from handles at creation time cough BattleEye cough
Processor:
HandleMaster currently only supports Intel processors due to the way address translation works. I plan to add support for AMD cpus in the near future (pull requests are welcome though).
Supported Windows Versions:
Windows 7 SP1 (6.1.7601)
Windows 8 (6.2.9200)
Windows 8.1 (6.3.9600)
Windows 10 TH1 (10.0.10240)
Windows 10 TH2 (10.0.10586)
Windows 10 Anniversary Update (10.0.14393)
Windows 10 Creators Update (10.0.15063)
Any problems please let me know :)
DKOM:http://baike.baidu.com/link?url=-hu14Boa3NOpEZnWc1pOetXIC49O0kjqAVo0rZrOhA9qTBBufGDTKrakYu_CzTe0mCQI9uAKtyGQagAJIXFJPK
CPUZ:http://www.cpuid.com/softwares/cpu-z.html
一点也看不懂啊,来膜拜大佬
页:
[1]