Jonas L Profile picture
Feb 28 8 tweets 2 min read
Breaking assumptions tend to cause interesting effects...
Lets mess with processes- ill likely post code later

POC: raw.githubusercontent.com/jonaslyk/temp/… Image
Allright - ever wondered what are the assertions for image file of a running a process?

pretty much nothing is safe to assume- its impossible to link a running process to its "origin data".
The file locks are easily bypassed(as unprivileged) and involving a filesystem driver is not even a requirement.

In the posted poc i use webdav to programmatically write the content of the emulated file used for spawning the "forked" copy.
then i use the variation between what is a valid path in win32 vs nt - a nt path can contain 0x00 just fine- win32, not so much.

Normally NTFS will limit the imagenames to valid NTFS chars though.
but there is no NTFS involved here- so I spawn the process with just 0x00 for name.

I use NtCreateUserProcess directly, skipping win32 layer- that would make it impossible. Image
every tool i tried errors in diferent ways, system informer is 100% nr. 1 at providing relevant and correct info though Image
windbg sometimes use info from the parent when debugging the process without imageame o.ô Image
cdn.discordapp.com/attachments/10…

pasto into visual studip- select c++ 20, newest c- F5

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jonas L

Jonas L Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jonasLyk

Dec 3, 2022
@0gtweet @Hexacorn Lets not forget the hidden ones, those that begin with = the cmd: set " will show them

We find the setting for current directory on each drive amongs them Image
@0gtweet @Hexacorn Allright, first we see them then we wreck them.
Notice the = is used as split character- so what if we make a drive with that as its letter? Image
@0gtweet @Hexacorn yah, logic error- we are now eternally trapped on the weird frankenstein drive :D

You can get out- can you figure out how?
Read 4 tweets
Aug 30, 2021
For quite some time ive been suspecting that ive been bootkitted.

Suddenly I couldnt read my SMBIOS table, windows detected a hyper visor even when disabled with bcdedit.

I could find traces of vpn connections getting established to MS ip addresses.
Sometimes there was invisible cpu devours, and what appeared to be something invisible scanning my files.

My pcr4 didnt change even when entering repair mode...

Now I finally identified the reason
Read 20 tweets
Jul 14, 2020
As Microsoft have no intensions of ever paying me for all my submitted vulnerabilities I am forced to do this.
Countdown starts today- then I will post them all public.
Ms is just trying to get time to patch them then never pay me.
I have for over 100.000$ in submissions.

14
I have not had a bounty paid for over 7 months I am in debt, my life is ruined- because I trusted that money was on the way.
I am getting sick by stress, but they just ignore me.

I have submitted hyper-v virtual file system escape.
bitlocker full hd encryption bypass
lock screen / login bypass
Total ntfs access control and file lock bypass for read from lowbox token sandbox
Uefi partition writeable from low box token sandbox
So many Escalation of privelegies I cannot keep track
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(