WindowsRegistryRootkit

内核rootkit,它存在于Windows注册表值数据中。(Kernel rootkit, that lives inside the Windows registry values data.)

Github stars Tracking Chart


Kernel rootkit, that lives inside the Windows registry value data.
By Oleksiuk Dmytro (aka Cr4sh)

http://twitter.com/d_olex
http://blog.cr4.sh
cr4sh0@gmail.com


Rootkit uses the zero day vulnerability in win32k.sys (buffer overflow in function win32k!bInitializeEUDC()) to get the execution at the OS startup.

Features:

  • NDIS-based network backdoor (+ meterpreter/bind_tcp).

  • In order to avoid unknown executable code detection it moves itself in the memory over discardable sections of some default Windows drivers.

  • Completely undetectable by public anti-rootkit tools.

  • Working on Windows 7 (SP0, SP1) x86.

diagram

This rootkit was originally presented at the ZeroNights 2012 conference during my talk.
See the slides and videos for more information: https://raw.githubusercontent.com/Cr4sh/blog/master/windows-registry-rootkit/Applied-anti-forensics.pdf

Overview

Name With OwnerCr4sh/WindowsRegistryRootkit
Primary LanguageC
Program languagePython (Language Count: 5)
PlatformWindows
License:
Release Count0
Created At2013-01-04 13:14:33
Pushed At2017-10-08 09:36:19
Last Commit At2017-10-08 12:36:01
Stargazers Count471
Watchers Count44
Fork Count147
Commits Count11
Has Issues Enabled
Issues Count0
Issue Open Count0
Pull Requests Count0
Pull Requests Open Count0
Pull Requests Close Count0
Has Wiki Enabled
Is Archived
Is Fork
Is Locked
Is Mirror
Is Private
To the top