0x12 Dark Development

945 posts

0x12 Dark Development banner
0x12 Dark Development

0x12 Dark Development

@Salsa12__

Offensive Security Academy

가입일 Şubat 2022
138 팔로잉1.5K 팔로워
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Abusing a vulnerable driver BYOVD to gain arbitrary kernel R/W and bypass PPL protection New Medium post. In this one, we will explore a technique used in offensive security that allows us to bypass PPL by abusing a vulnerable driver with R/W kernel vuln @s12deff/abusing-a-vulnerable-driver-byovd-to-gain-arbitrary-kernel-r-w-and-bypass-ppl-protection-571552c7efc8" target="_blank" rel="nofollow noopener">medium.com/@s12deff/abusi…
English
0
1
13
472
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Just finished the PPL disable from R/W Kernel BYOVD Soon on Medium, what do you think? Still need some help with PatchGuard. One dirty trick could be to disable PPL, do the malicious stuff, and then re-enable it right away
0x12 Dark Development tweet media0x12 Dark Development tweet media
English
0
7
37
1.5K
0xFF assemblydev(%rip)
0xFF assemblydev(%rip)@assemblydevyt·
@Salsa12__ No worries, also isn't the return a DWORD64? If I got the sense right you should return the address in the kernel mem, and the address should be 64 not 32 (normal windows DWORD should be 32)
English
1
0
1
15
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Reversing a Vulnerable Driver: Discovering a Process Termination Primitive New Medium post, in this one see the reversing process of a vulnerable Windows kernel driver to understand how it can be abused to terminate arbitrary processes from kernel @s12deff/reversing-a-vulnerable-driver-discovering-a-process-termination-primitive-34aea14b9563" target="_blank" rel="nofollow noopener">medium.com/@s12deff/rever…
English
0
27
122
6.2K
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Starting my driver reverse engineering journey Any advice?
0x12 Dark Development tweet media
English
7
3
113
7.9K
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Trying to organize the primitives into a single context...
0x12 Dark Development tweet media
English
0
1
10
700
Daniel Madumere
Daniel Madumere@0xmadumere·
@Salsa12__ Just finished reading you're medium post about exploiting vulnerable drivers, I love your work, Im just starting my driver creation and reverse engineering journey
English
1
0
1
316
rick
rick@mihomoparty·
@Salsa12__ i use python scan about 20,000 drivers' imports and success find some bvyods and cves
English
2
0
1
248
Cvewhen?
Cvewhen?@cvewhen·
@Salsa12__ Join communities and ask for help there are kind people everywhere.
English
1
0
1
260
Rtl Init Thread
Rtl Init Thread@RtlInitThread·
@Salsa12__ Keep reversing, never give up. You should look up into reverse engineering blogs, it will help you a lot. As to reverse engineer drivers, you need to understand how they are engineered, so i would recommend watching youtube videos or reading blogs that explains how they are made.
English
1
0
4
471