win_kernel_exp_1 发表于 2025-03-20 更新于 2025-04-02
字数总计: 2k 阅读时长: 7分钟 中国
环境配置 首先将目标机器调成debug模式:
1 2 3 4 5 C:\Windows\system32>bcdedit /copy {current} /d "Kernel Debugging On" The entry was successfully copied to {自动生成的id}. C:\Windows\system32>bcdedit /debug {自动生成的id} on The operation completed successfully.
用COM pipe串行端口配置双机调试。
在目标机器上配置好HEVD驱动后有个坑,windbg里的HEVD的符号表必须配置C:\projects\hevd\build\driver\vulnerable\x86\HEVD\HEVD.pdb
,按照习惯配置SRV*path*
不行。
此时就可以看到HEVD驱动的symbol载入了:
1 2 3 4 5 6 7 8 9 10 11 12 0: kd> x /D HEVD!a* A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 9659e4f0 HEVD!AllocateFakeObjectNonPagedPoolNx (void) 9659e11c HEVD!AllocateFakeObjectNonPagedPool (void) 9659e236 HEVD!AllocateUaFObjectNonPagedPool (void) 9659e734 HEVD!AllocateUaFObjectNonPagedPoolNxIoctlHandler (void) 9659cbce HEVD!ArbitraryWriteIoctlHandler (void) 9659e216 HEVD!AllocateFakeObjectNonPagedPoolIoctlHandler (void) 9659e5ee HEVD!AllocateFakeObjectNonPagedPoolNxIoctlHandler (void) 9659e60e HEVD!AllocateUaFObjectNonPagedPoolNx (void) 9659e35a HEVD!AllocateUaFObjectNonPagedPoolIoctlHandler (void)
内核常用的两个函数 和设备驱动交互的句柄通过createFileA
获得:
1 2 3 4 5 6 7 8 9 HANDLE CreateFileA ( [in] LPCSTR lpFileName, [in] DWORD dwDesiredAccess, [in] DWORD dwShareMode, [in, optional] LPSECURITY_ATTRIBUTES lpSecurityAttributes, [in] DWORD dwCreationDisposition, [in] DWORD dwFlagsAndAttributes, [in, optional] HANDLE hTemplateFile ) ;
获得句柄后使用deviceIoControl
函数获得设备的输入和输出控制(IOCTL)接口:
1 2 3 4 5 6 7 8 9 10 BOOL DeviceIoControl ( [in] HANDLE hDevice, [in] DWORD dwIoControlCode, [in, optional] LPVOID lpInBuffer, [in] DWORD nInBufferSize, [out, optional] LPVOID lpOutBuffer, [in] DWORD nOutBufferSize, [out, optional] LPDWORD lpBytesReturned, [in, out, optional] LPOVERLAPPED lpOverlapped ) ;
简单调试一下DriverEntry 重启机器后break在HEVD的DriverEntry
函数:
1 2 3 4 5 6 7 8 9 10 11 12 kd> bu HEVD!DriverEntry kd> kd> lm m H* start end module name 82e44000 82e7a000 hal (deferred) 8ba00000 8ba08000 hwpolicy (deferred) kd> g KDTARGET: Refreshing KD connection Breakpoint 0 hit Breakpoint 1 hit HEVD!DriverEntry: 96c7f000 55 push ebp
看一下IoCreateSymbolicLink
的调用,call它的地址的最后1.5个字节是0xB4
:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 3: kd> bu 96c7f0b4 3: kd> u 96c7f0b4 HEVD!DriverEntry+0xb4 [c:\projects\hevd\driver\hevd\hacksysextremevulnerabledriver.c @ 147]: 96c7f0b4 ff151090c396 call dword ptr [HEVD!_imp__IoCreateSymbolicLink (96c39010)] 96c7f0ba 8b350490c396 mov esi,dword ptr [HEVD!_imp__DbgPrintEx (96c39004)] 96c7f0c0 8bf8 mov edi,eax 96c7f0c2 6812f2c796 push offset HEVD! ?? ::PBOPGDP::`string' (96c7f212) 96c7f0c7 68aef3c796 push offset HEVD! ?? ::PBOPGDP::`string' (96c7f3ae) 96c7f0cc 6a03 push 3 96c7f0ce 6a4d push 4Dh 96c7f0d0 ffd6 call esi 3: kd> g Breakpoint 3 hit HEVD!DriverEntry+0xb4: 96c7f0b4 ff151090c396 call dword ptr [HEVD!_imp__IoCreateSymbolicLink (96c39010)] 3: kd> r eax=8d7be9bc ebx=86e0a030 ecx=00000000 edx=85645240 esi=00000000 edi=86e0a0d8 eip=96c7f0b4 esp=8d7be9a0 ebp=8d7be9c8 iopl=0 nv up ei pl nz na pe nc cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000206 HEVD!DriverEntry+0xb4: 96c7f0b4 ff151090c396 call dword ptr [HEVD!_imp__IoCreateSymbolicLink (96c39010)] ds:0023:96c39010={nt!IoCreateSymbolicLink (82beab70)} 3: kd> dd esp L1 8d7be9a0 8d7be9bc 3: kd> dS 8d7be9bc 96c7f182 "\DosDevices\HackSysExtremeVulner" 96c7f1c2 "ableDriver"
IoCreateSymbolicLink
函数调用:
1 2 3 4 5 6 7 8 9 10 11 NTSTATUS IoCreateSymbolicLink ( [in] PUNICODE_STRING SymbolicLinkName, [in] PUNICODE_STRING DeviceName ) ;
可以看到这个函数的第一个参数即DosDeviceName
(用户模式下的符号链接名称)是\DosDevices\HackSysExtremeVulnerableDriver
。
驱动结构体如下:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 typedef struct _DRIVER_OBJECT { CSHORT Type; CSHORT Size; PDEVICE_OBJECT DeviceObject; ULONG Flags; PVOID DriverStart; ULONG DriverSize; PVOID DriverSection; PDRIVER_EXTENSION DriverExtension; UNICODE_STRING DriverName; PUNICODE_STRING HardwareDatabase; PFAST_IO_DISPATCH FastIoDispatch; PDRIVER_INITIALIZE DriverInit; PDRIVER_STARTIO DriverStartIo; PDRIVER_UNLOAD DriverUnload; PDRIVER_DISPATCH MajorFunction[IRP_MJ_MAXIMUM_FUNCTION + 1 ]; } DRIVER_OBJECT, *PDRIVER_OBJECT;
HEVD会将IRP功能设置为IRP_MJ_DEVICE_CONTROL
,即处理IOCTL(I/O控制)请求,并将其指向IrpDeviceIoCtlHandler
函数:
1 2 3 4 5 6 7 8 9 10 11 12 memset32 (DriverObject->MajorFunction, IrpNotImplementedHandler, 0x1C u);DriverObject->MajorFunction[0xE ] = IrpDeviceIoCtlHandler; DriverObject->MajorFunction[2 ] = IrpCreateCloseHandler;
x86栈溢出