Skip to content

Commit a08c349

Browse files
committed
Path Updates
Updated Links for New PoC
1 parent 075b68c commit a08c349

File tree

12 files changed

+44
-819
lines changed

12 files changed

+44
-819
lines changed

AMSI BYPASS/Amsi_simple_patch/Cargo.lock

Lines changed: 0 additions & 156 deletions
This file was deleted.

Dynamic_Resolver/Cargo.lock

Lines changed: 0 additions & 156 deletions
This file was deleted.

KiUserExceptionDispatcherStepOver/Cargo.lock

Lines changed: 0 additions & 7 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

KiUserExceptionDispatcherStepOver/README.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
## Bypassing EDR Syscall Hooks with a **Custom Early Exception Handler**
1+
## Bypassing EDR Syscall Hooks with a Early Exception Handler
22

33
The problem with the (VEH, SEH, etc..) are themselves **hooked and monitored heavily by modern EDRs**
44

@@ -9,17 +9,24 @@ Modern EDRs monitor **syscalls** by placing **inline hooks** (usually a `jmp` at
99

1010
so when you call hooked funcitons like `NtAllocateVirtualMemory`, `NtProtectVirtualMemory`, … the EDR gets the first chance to inspect the arguments and block the call.
1111

12-
So we are developing our own exception handler without relying on VEH or SEH to manipulate exception handling before the VEH is called
12+
So to avoid detection, we can develop our own exception handler without relying on VEH or SEH to manipulate exception handling before the VEH is called.
13+
14+
To know more about this, the Example poc has been described in detail in this blog: [Early Exception Handling](https://kr0tt.github.io/posts/early-exception-handling/)
15+
16+
> Note: Please note that this poc uses hardcoded SSN just for demonstration of the PoC. in your practices you can extract and use SSN using syscall techniques using Hells/halos/tartarus gate: For Syscall technique you can visit this seciton: [Indirect Syscall]()
1317
14-
The Amazing PoC has been described in-detail in this blog: []()
1518
## PoC
1619

17-
We are going to test it on EDR Products.
20+
We are going to test it on EDR Products. [Release Mode]
1821

1922
![image_1](./img/bypass_hooks1.png)
2023

2124
![image_2](./img/bypass_hooks2.png)
2225

26+
Debug print that explains how this PoC works step by step [Debug Mode]
27+
28+
![image_3](./img/debug_print.png)
29+
2330
## Usage
2431

2532
To compile and run in debug mode. [To understand How this works]
@@ -40,12 +47,11 @@ To compile on release mode [Final]:
4047
cargo b -r
4148
```
4249

43-
4450
## Credits / Resoucres
4551

4652
- https://kr0tt.github.io/posts/early-exception-handling/
4753
- https://www.ibm.com/think/x-force/using-veh-for-defense-evasion-process-injection
4854
- https://mannyfreddy.gitbook.io/ya-boy-manny#fun-with-exception-handlers
4955
- https://revers.engineering/applied-re-exceptions/
56+
- https://github.com/joaoviictorti/dinvk/tree/main?tab=readme-ov-file#retrieving-module-addresses-and-exported-apis
5057
- https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html
51-
101 KB
Loading

0 commit comments

Comments
 (0)