EDRSandblast icon indicating copy to clipboard operation
EDRSandblast copied to clipboard

TODO: check if 24H2 edition of Windows breaks things in EDRSandblast and fix them if needed

Open themaks opened this issue 1 year ago • 0 comments

https://windows-internals.com/kaslr-leaks-restriction/ : many userland APIs now restrict processes to access kernel addresses, in order not to break KASLR and make kernel exploits more complex. This does not affect processes with SeDebugPrivilege though so it is not a long term problem for EDRSandblast (Microsoft's goal is to harden the user->admin boundary; not the usermode-admin->kernelmode one).

This should break some of EDRSandblast code if we do not enable SeDebugPrivilege before calling APIs that are used to leak kernel pointer (such as kernel module addresses, kernel objects' handles, etc.)

TODO: review the code and ensure the privilege is set before these operations. (I am noting this here as a reminder to myself since it could break EDRSandblast in the near future; but if someone wants to contribute, be my guest 😃 )

themaks avatar Nov 28 '23 11:11 themaks