Elliot

66 posts

Elliot banner
Elliot

Elliot

@ElliotKillick

Security engineer and researcher | Elliot on Security

Toronto, Canada เข้าร่วม Şubat 2021
40 กำลังติดตาม3.5K ผู้ติดตาม
Elliot
Elliot@ElliotKillick·
Calling all experts in Windows internals and low-level systems architecture! 'The Root of DllMain Problems' (or 'DllMain Rules Rewritten') is now in preparation for its final publication! Feedback and sign-offs from the community are greatly appreciated. #the-root-of-dllmain-problems" target="_blank" rel="nofollow noopener">github.com/ElliotKillick/…
English
2
58
188
12.8K
Elliot
Elliot@ElliotKillick·
To all my infosec friends, if your blog doesn't yet have an email newsletter for your subscribers... well now you can have one set up in no time at virtually no cost - all open source. You're welcome. github.com/ElliotKillick/…
English
0
6
17
1.9K
Elliot
Elliot@ElliotKillick·
Today, I'm releasing a new project that automates sending email newsletter notifications for new content on your blog: rss2newsletter! In just 300 lines of code, it easily replaces any overpriced and bloated proprietary solution that charges you per-contact. See link in bio 🔗
English
1
1
5
749
Elliot
Elliot@ElliotKillick·
Today, I'm releasing a new project that automates sending email newsletter notifications for new content on your blog: rss2newsletter! In 300 lines of code, it easily replaces any overpriced and bloated proprietary solution that charges you per-contact github.com/ElliotKillick/…
English
0
0
3
549
Elliot
Elliot@ElliotKillick·
I just released a new tool for searching Microsoft Developer Blogs in bulk and fully local. Really helpful for finding information on that one Windows internals component github.com/ElliotKillick/…
English
0
4
9
1.4K
Elliot
Elliot@ElliotKillick·
I think I have a problem with going down rabbit holes
English
0
0
1
748
Elliot
Elliot@ElliotKillick·
A comprehensive analysis of all the internal Windows 10 loader states? Done - Have a look at that and a high-level analysis of how a library load works under the parallel loader #ldr_ddag_nodestate-analysis" target="_blank" rel="nofollow noopener">github.com/ElliotKillick/…
English
0
7
30
1.9K
Elliot
Elliot@ElliotKillick·
Reverse engineering the Windows 10 parallel loader is challenging but interesting work. I recently fully reversed the pivotal LdrpDrainWorkQueue function and I'm just now working on LdrpLoadDllInternal plus others #reverse-engineered-windows-loader-functions" target="_blank" rel="nofollow noopener">github.com/ElliotKillick/…
English
0
14
52
4.3K
Elliot
Elliot@ElliotKillick·
DllMain Rules Rewritten are Microsoft's infamous DllMain Rules - rewritten. After countless spent hours researching and reverse engineering the new and old Windows loaders, they are now complete. #the-root-of-dllmain-problems" target="_blank" rel="nofollow noopener">github.com/ElliotKillick/…
English
0
44
108
10.4K
Elliot
Elliot@ElliotKillick·
I just spent the last few months of my life reverse engineering the Windows 10 parallel loader and figuring out how it does concurrency. Updates have now been published! github.com/ElliotKillick/…
English
3
47
160
11.5K
Elliot
Elliot@ElliotKillick·
@sixtyvividtails Sure. You have to break on data access of the SRW lock because the loader modifies it directly without calling RtlAcquireSRWLockExclusive sometimes
English
1
0
0
73
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ElliotKillick No contradictions here. Now accept that the first entry in the module list is a regular entry. Then correct FreeLibrary info: it is able to unload dependencies. Then explain wth module deinit "done before" refcount decremented. Dupe instr - where? Locks count 20 is wrong. Etc...
English
1
0
0
76
Elliot
Elliot@ElliotKillick·
What is Loader Lock? 🤔 Going BEYOND undocumented, we delve into the heart of the modern Windows loader investigating some internals for the first time and demystifying Loader Lock. 🔒 Check out the research article elliotonsecurity.com/what-is-loader…
English
2
26
53
7.2K
Elliot
Elliot@ElliotKillick·
@sixtyvividtails Thanks for contributing, I'll update the repo shortly
English
0
0
0
99
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ElliotKillick LDR_DATA_TABLE_ENTRY.Lock is srwlock used to protect saving resolved delay-load imports into module. See ntdll!LdrpWriteBackProtectedDelayLoad.
English
1
0
1
177
Elliot
Elliot@ElliotKillick·
Thrilled to unveil the "Windows vs Linux Loader Architecture" project! The FIRST side-by-side comparison ever done unraveling the similarities and differences of this core component between operating systems. Check out the new repo! github.com/ElliotKillick/…
English
1
37
93
8.5K
Elliot
Elliot@ElliotKillick·
@sixtyvividtails Yes, so the list heads are part of the circular list. Look for yourself in WinDbg. I didn't make the pic but I'll check that. Any more perceived errors could only be due to your misunderstanding for which I would be happy to clarify.
English
1
0
0
80
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ElliotKillick Var ntdll!PebLdr type is PEB_LDR_DATA. It contains list heads. Module lists are linked into these heads. So the first LDR_*_ENTRY *is* regular entry, and arrow (4) from the lower-left quad in your pic should actually point to PEB_LDR_DATA+30. And much more errors in the article.
English
1
0
0
84
Elliot
Elliot@ElliotKillick·
@sixtyvividtails Nope, you don't know what you're on about. ntdll!PebLdr is part of the module linked list. I verified this in multiple ways. My research is entirely accurate. Twitter commenters like you are unfortunately common.
English
1
0
0
86
sixtyvividtails
sixtyvividtails@sixtyvividtails·
@ElliotKillick I have to retract that first statement. While it's obvious a lot of effort was put into the research, closer look reveals that article contains a number of substantial innaccuracies, and has certain self-contradictory issues.
sixtyvividtails tweet media
English
1
0
0
170
Elliot
Elliot@ElliotKillick·
The full and open source code used in "Perfect DLL Hijacking" has now been released on GitHub: LdrLockLiberator github.com/ElliotKillick/…
English
4
128
335
32.3K
Elliot
Elliot@ElliotKillick·
Perfect DLL Hijacking: It's now possible with the latest in security research. Building on previous insights from @NetSPI, we reverse engineer the Windows library loader to disable the infamous Loader Lock and achieve ShellExecute straight from DllMain. 🔍 Link in bio 🔗
Elliot tweet media
English
14
291
805
119K