Back to Browse

DLL Injection Into All Processes - Part 15 - Coding Win Driver: Invoking Shellcode, Loading FAKE.DLL

2.0K views
May 29, 2021
1:01:20

Coding it in WinAPI/C++ using Visual Studio - Coding Windows Driver: Invoking Shell-Code & Loading FAKE.DLL Blog post: https://dennisbabkin.com/blog/?i=AAA10800 0:00 Intro 0:40 Recap of how our Shell-code will run from the UserModeNormalRoutine() function 5:24 Diagram with explanation of invoking kernel APCs to run our Shell-code in user-mode 14:15 Finishing up writing kernel APC callbacks: KernelRoutine_Proc(), NormalRoutine_Proc() 37:19 Adding code to inject DLL into OnLoadImage() callback via our CSection::InjectDLL() function 40:32 Building and testing our injection project with the notepad.exe process only 50:17 Example of dealing with a crash in a user-mode process (notepad.exe), collecting crash dumps with WERSetup 52:40 Adjusting NormalRoutine_Proc() to handle injection into WOW64 processes with PsWrapApcWow64Thread 56:23 Testing injection into WOW64 notepad.exe process #kernel #driver #tutorial #cpp #win32

Download

0 formats

No download links available.

DLL Injection Into All Processes - Part 15 - Coding Win Driver: Invoking Shellcode, Loading FAKE.DLL | NatokHD