Coding it in WinAPI/C++ using Visual Studio - Coding Windows Driver: DLL Injection - ShellCode x86
Blog post: https://dennisbabkin.com/blog/?i=AAA10800
0:00 Intro
1:07 Adding dll_asm32.asm file with the base-independent x86 Assembly shell-code to the FAKE.DLL project:
https://dennisbabkin.com/blog/?i=AAA00C00
2:04 Recap of UserModeNormalRoutine function from x64 Assembly code.
4:31 Coding getStr_LdrLoadDll() function to obtain pointer to a base-independent static string
25:55 Coding getStr_NtUnmapViewOfSection() function to obtain pointer to a base-independent static string
30:58 Coding getProcAddrForMod function to resolve exported function address from a module in base-independent x86 Assembly
47:59 Coding UserModeNormalRoutine function in base-independent x86 Assembly
59:54 Setting up UserModeNormalRoutine function to be exported as the ordinal 1 in Exports.def
1:02:33 Explanation how to mark UserModeNormalRoutine function to bypass Export Suppression from CFG:
https://docs.microsoft.com/en-us/windows/win32/secbp/pe-metadata#export-suppression
1:05:00 Coding exported stub function f1() to include CFG conformance for the UserModeNormalRoutine function
#kernel #driver #tutorial #cpp #win32
Download
0 formats
No download links available.
DLL Injection Into All Processes - Part 12 - Coding Windows Driver: DLL Injection - ShellCode x86 | NatokHD