Back to Browse

DLL Injection Into All Processes - Part 12 - Coding Windows Driver: DLL Injection - ShellCode x86

580 views
May 29, 2021
1:10:41

Coding it in WinAPI/C++ using Visual Studio - Coding Windows Driver: DLL Injection - ShellCode x86 Blog post: https://dennisbabkin.com/blog/?i=AAA10800 0:00 Intro 1:07 Adding dll_asm32.asm file with the base-independent x86 Assembly shell-code to the FAKE.DLL project: https://dennisbabkin.com/blog/?i=AAA00C00 2:04 Recap of UserModeNormalRoutine function from x64 Assembly code. 4:31 Coding getStr_LdrLoadDll() function to obtain pointer to a base-independent static string 25:55 Coding getStr_NtUnmapViewOfSection() function to obtain pointer to a base-independent static string 30:58 Coding getProcAddrForMod function to resolve exported function address from a module in base-independent x86 Assembly 47:59 Coding UserModeNormalRoutine function in base-independent x86 Assembly 59:54 Setting up UserModeNormalRoutine function to be exported as the ordinal 1 in Exports.def 1:02:33 Explanation how to mark UserModeNormalRoutine function to bypass Export Suppression from CFG: https://docs.microsoft.com/en-us/windows/win32/secbp/pe-metadata#export-suppression 1:05:00 Coding exported stub function f1() to include CFG conformance for the UserModeNormalRoutine function #kernel #driver #tutorial #cpp #win32

Download

0 formats

No download links available.

DLL Injection Into All Processes - Part 12 - Coding Windows Driver: DLL Injection - ShellCode x86 | NatokHD