Coding it in WinAPI/C++ using Visual Studio - Coding Windows Driver: Invoking Shell-Code & Loading FAKE.DLL
Blog post: https://dennisbabkin.com/blog/?i=AAA10800
0:00 Intro
0:40 Recap of how our Shell-code will run from the UserModeNormalRoutine() function
5:24 Diagram with explanation of invoking kernel APCs to run our Shell-code in user-mode
14:15 Finishing up writing kernel APC callbacks: KernelRoutine_Proc(), NormalRoutine_Proc()
37:19 Adding code to inject DLL into OnLoadImage() callback via our CSection::InjectDLL() function
40:32 Building and testing our injection project with the notepad.exe process only
50:17 Example of dealing with a crash in a user-mode process (notepad.exe), collecting crash dumps with WERSetup
52:40 Adjusting NormalRoutine_Proc() to handle injection into WOW64 processes with PsWrapApcWow64Thread
56:23 Testing injection into WOW64 notepad.exe process
#kernel #driver #tutorial #cpp #win32
Download
0 formats
No download links available.
DLL Injection Into All Processes - Part 15 - Coding Win Driver: Invoking Shellcode, Loading FAKE.DLL | NatokHD