Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Information] Microsoft banned Microsoft SysInternals Process Explorer driver #56

Closed
hfiref0x opened this issue Mar 14, 2023 · 0 comments

Comments

@hfiref0x
Copy link
Owner

hfiref0x commented Mar 14, 2023

It took them 10+ years and about 4 different APT usages (which I can count/remember) to figure out that something is wrong with it.

Recent update of WDAC blocklist now include block of all Process Explorer drivers with version <=16.x. Since this driver is used in KDU as well (as victim shellcode placeholder/target) this change will also affect KDU.

New 17.x Process Explorer driver bring the following "security" improvements:

First, in IOCTL callable routine responsible for openning handle for given process it now checks whatever this process you want to open is "protected" (PsIsProtectedProcess) and if it is - then sets access flags to PROCESS_QUERY_LIMITED_INFORMATION.

Second, the routine involving ZwDuplicateObject also got similar update not allowing you to duplicate handles of protected processes or PsInitialSystemProcess.

hfiref0x added a commit that referenced this issue Mar 22, 2023
Added Hilscher wormhole driver as provider 31
Internal rearrange #56
Readme updated
@hfiref0x hfiref0x pinned this issue Mar 24, 2023
@hfiref0x hfiref0x mentioned this issue Mar 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant