Dolboeb Executor Save Abandoned

capcom-like executor for any physmem driver

Project README

dolboeb-executor

Arbitrary code execution inside of vulnerable driver

How's this works?

Dolboeb-executor will replace a function inside vulnerable driver to a handler:
img
Then it will trigger that function(with ioctl for example) and this handler will execute our UM callback

How can i customize it?

This solution have a PhyMem example out of the box.
You can use any driver that you want.
Dolboeb-executor have an abstract interface to create your own 'exploits' classes.
img
The PhyMem example overrides it like this.
img
A little explanation about how this phymem exploit works:
Well nothing interesting, it just passes IoCtl with map/unmap codes.
Then reads or writes to the mapped regions.
Function that this rva points to at line n70 is the IoCTL handler.
So we'll patch it to our stub and then call it via IoCTL.

ezpz :)

Open Source Agenda is not affiliated with "Dolboeb Executor" Project. README Source: es3n1n/dolboeb-executor
Stars
39
Open Issues
0
Last Commit
2 years ago

Open Source Agenda Badge

Open Source Agenda Rating