0e82ced082
This commit includes: * RDI binary that abuses the SMEP bypass and userland function pointer invocation that is provided by the driver. * Related metasploit module. * Associated make.build to build from command line. * Updated command line build file. This also includes the beginnings of a new set of functions that help with the management/automation of kernel-related work on Windows for local priv esc exploits.
24 lines
524 B
C
Executable File
24 lines
524 B
C
Executable File
#ifndef _KERNEL_H
|
|
#define _KERNEL_H
|
|
|
|
#include "windefs.h"
|
|
|
|
typedef struct _MemMapping
|
|
{
|
|
HANDLE mapping;
|
|
LPBYTE buffer;
|
|
} MemMapping;
|
|
|
|
BOOL was_token_replaced();
|
|
BOOL prepare_for_kernel();
|
|
VOID steal_process_token();
|
|
VOID hal_dispatch_steal_process_token();
|
|
ULONG_PTR get_hal_dispatch_pointer();
|
|
DWORD get_page_size();
|
|
BOOL create_anon_mapping(MemMapping* memMap);
|
|
VOID destroy_anon_mapping(MemMapping* memMap);
|
|
VOID invoke_hal_dispatch_pointer();
|
|
BOOL is_driver_loaded(wchar_t* driverName);
|
|
|
|
#endif
|