Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chapter4-demo3 syscalls #3

Open
N00BIER opened this issue Apr 5, 2024 · 0 comments
Open

chapter4-demo3 syscalls #3

N00BIER opened this issue Apr 5, 2024 · 0 comments

Comments

@N00BIER
Copy link

N00BIER commented Apr 5, 2024

In chapter4-demo3 you say:
// Code below is adapted from @modexpblog. Read linked article for more details. // https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams
However, what you do is just getting syscall addresses from the ntdll.dll that has been already loaded into the process. Most likely, they would have been hooked by EDR. Whereas the author's idea was to get syscalls from LdrpThunkSignature structure and load a new copy of ntdll.dll into the process space.

Also, direct syscall for NtCreateThreadEx does not work for some reason...

UPD re Syscall Numbers: for some reason the syscall numbers returned by SW3_GetSyscallNumber are incorrect. In my case, the discrepancy between returned value and correct one is 4.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant