Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
116 subscribers
174 photos
10 videos
7 files
523 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Low Level CO 🇨🇴 pinned «Proxy: Next Generation Polymorphism in C++ #polymorphic #obfuscation @ZwLowLevel https://github.com/microsoft/proxy»
A novel technique to instantly retrieve Windows kernel base address with a single instruction

#include <ntddk.h>
#include <intrin.h>

NTSTATUS DriverEntry(PDRIVER_OBJECT pDriverObject, PUNICODE_STRING pRegistryPath)
{
UNREFERENCED_PARAMETER(pRegistryPath);

// Get kernel base address
uintptr_t kernel_base = __readmsr(0xC0000082) & ~0xFFFFFF;

DbgPrint("[+] ntoskrnl.exe base: 0x%llx\n", kernel_base);

// Verify it's a valid PE
PIMAGE_DOS_HEADER dos = (PIMAGE_DOS_HEADER)kernel_base;
PIMAGE_NT_HEADERS nt = (PIMAGE_NT_HEADERS)(kernel_base + dos->e_lfanew);

DbgPrint("[+] Image size: 0x%x (%u MB)\n",
nt->OptionalHeader.SizeOfImage,
nt->OptionalHeader.SizeOfImage / (1024 * 1024));

pDriverObject->DriverUnload = DriverUnload;
return STATUS_SUCCESS;
}

void DriverUnload(PDRIVER_OBJECT pDriverObject)
{
UNREFERENCED_PARAMETER(pDriverObject);
DbgPrint("[-] Driver unloaded\n");
}


#windows_internals #windows_kernel #ntoskrln #ring0
@ZwLowLevel
AMD64 Architecture Programmer’s Manual Volume 1:
Application Programming


#os_internals #amd64
@ZwLowLevel

https://docs.amd.com/v/u/en-US/24592_3.24
Fun-reliable side-channels for cross-container communication

#linux_hacking #kernel #linux_kernel
@ZwLowLevel


https://h4x0r.org/funreliable/
Please open Telegram to view this post
VIEW IN TELEGRAM