1 Star 0 Fork 0

kifast / MemoryRanger

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
贡献代码
同步代码
取消
提示: 由于 Git 不支持空文件夾,创建文件夹后会生成空的 .keep 文件
Loading...
README

Updated MemoryRanger: Hijacking Is Not An Option

Updated MemoryRanger prevents the following new attacks:

  • Hijacking of NTFS structures gains an unauthorized access to files opened without shared access by patching Stream Control Block structures;
  • Handle Hijacking Attack provides illegal access to exclusively open files via patching handle table entries;
  • Token Hijacking Attack is designed to elevate the process privileges without using token-swapping technique;

News:

  • Demos with Handle Hijacking and Token Hijacking as well as their prevention on newest Windows 10 1903 are below.
  • Demos with Hijacking of NTFS structures will be soon.
  • Updated MemoryRanger implements special memory enclave to protect the sensitive kernel data, e.g. Token Structures, from being tampered with all drivers, the scheme is below.

Handle Hijacking Attack and its Preventing are here:

Handle Hijacking Attack The Prevention of Handle Hijacking

Token Hijacking Attack and its Preventing are here:

Handle Hijacking Attack The Prevention of Handle Hijacking

MemoryRanger

MemoryRanger hypervisor moves newly loaded drivers into isolated kernel spaces by using VT-x and EPT. MemoryRanger has been presented at Black Hat Europe 2018 and CDFSL 2019. MemoryRanger runs driver inside separate enclaves to protect the following kernel-mode areas:

  • allocated data, drivers code, and EPROCESS.token fields (BlackHat 2018);
  • FILE_OBJECT structures (CDFSL 2019).

MemoryRanger at the CDFSL 2019:

  • demonstration of illegal access to an exclusive open file via FILE_OBJECT hijacking;
  • prevention of FILE_OBJECT hijacking;
  • paper, slides, demos are here.

The Hijacking Attack The Attack Prevention

MemoryRanger at the Black Hat Europe 2018

alt text

  • demonstration of illegal access to allocated data, drivers code, and EPROCESS.token field;
  • protection of the dynamically allocated data;
  • preventing newly loaded drivers to escalate process priviledges;
  • paper, slides, demos are here.

The Attack The Attack Prevention

Details

MemoryRanger hypervisor is based on these projects:

空文件

简介

暂无描述 展开 收起
取消

发行版

暂无发行版

贡献者

全部

近期动态

加载更多
不能加载更多了
1
https://gitee.com/kifast/MemoryRanger.git
git@gitee.com:kifast/MemoryRanger.git
kifast
MemoryRanger
MemoryRanger
master

搜索帮助