How Hackers Exploit Vulnerable Drivers

Поділитися
Вставка
  • Опубліковано 3 січ 2025

КОМЕНТАРІ • 108

  • @diveallz1044
    @diveallz1044 Рік тому +18

    One of my favorite topics so glad to see you do some deep dives on it love the content man

  • @stephencole9289
    @stephencole9289 Рік тому +8

    Note - The interesting stuff (loading the driver etc) needs to be done as admin. However the driver etc then allows you to do things that even having admin wouldnt be possible or easy.

    • @ytg6663
      @ytg6663 Рік тому

      How would attacker get privilege escalation in first place??

    • @TbM
      @TbM Рік тому

      @@ytg6663 There are different aproaches, most users are simply dumb and will click on "yes" if the system asks for it...

    • @testuser1235
      @testuser1235 Рік тому

      @@ytg6663 Cause windows already uses a lot of drivers and often these have vulnerabilites.

    • @CyberZyro
      @CyberZyro Рік тому

      @@ytg6663 @stephencole9289
      actually this method is first and mostly used by game hackers for bypassing kernel level anticheats by loading their cheats or anticheat bypass mechanisms on kernel level, i didnt saw it being used or exploited by a threat actor in the post exploitation phase after "gaining initial access to victim systems", so yeah you can say that the whole point of this hack is just to get some ring 0 access on systems to do other shenanegans (though u can use it as a post expllitation tool to do some other shit as well)

    • @breadcraft3605
      @breadcraft3605 8 місяців тому

      @@ytg6663 hmmm.. the user doing it

  • @J0R1AN
    @J0R1AN Рік тому +4

    I just got an ad with John at the start and thought the video had already started lmao

  • @idkhidden
    @idkhidden Рік тому

    Finally Was Waiting For This Video

  • @nepzraaz
    @nepzraaz Рік тому +1

    Great content John

  • @R3v0ult
    @R3v0ult Рік тому +1

    Nice video, John!

  • @not_yet_implemented
    @not_yet_implemented Рік тому +2

    Funny seeing an ad before this video with you in it 😂

  • @finnymarigold58
    @finnymarigold58 Рік тому +3

    Anyone else get the synk ctf ad from the prevideo ads?

  • @SumanRoy.official
    @SumanRoy.official Рік тому +15

    Well, without digital signature if you try to run any executable defender will flag it. It worked because it is compiled on the same machine where it was executed. Else I don't see anyway around it.

    • @ec0logiskasec045
      @ec0logiskasec045 Рік тому

      what are you talking about? Defender wont flag any executable but it will just throw a security warning for the exe, and ask the user if he really wants to run it

    • @ec0logiskasec045
      @ec0logiskasec045 Рік тому

      also i dont know if you know but other files exist besides executables

    • @nero2k619
      @nero2k619 Рік тому +7

      Digital Signature blocks unsigned drivers and on windows 10 and 11 there is also driver blacklist which will stop from loading any vulnerable drivers that are known for being abused. However, if you load a signed driver that is not present in blacklist then you could use it to load another unsiged driver into kernel which then you can call by your client application. Defender & EDRs won't stop you unless you are trying to load something that has been already signatured.

    • @ProdBySneezy
      @ProdBySneezy Рік тому

      @@nero2k619 you can pay to have your drivers signed, or you can manually map your drivers with open source tools

    • @EvilSapphireR
      @EvilSapphireR Рік тому

      ​@@nero2k619are you talking about using a signed driver to turn off windows DSE?

  • @Gray3ther
    @Gray3ther Рік тому

    Thanx for sharing John...sweeeet shirt!!

  • @JassonCordones
    @JassonCordones Рік тому

    This is scary. Great video !

  • @honestsniping1
    @honestsniping1 Рік тому +3

    But wouldn't you see the executed comands at 22:10 in an EDR under the msmpeng process tree? Or will comands executed on a kernel level not be visible on an EDR?

    • @nero2k619
      @nero2k619 Рік тому +5

      This video doesn't test against EDR only against AV. If you try to inject into EDR then this would still work and you would successully be injected into EDR process but it will also trigger an alert and create events because EDRs also use kernel drivers for monitoring and protection of its own user mode process. The proper approach would be removing EDRs callbacks before trying to inject the payload because in the kernel you are a lot more exposed then in user space in regards to visiblity.

    • @nero2k619
      @nero2k619 Рік тому +5

      Also, the driver is the only component here that runs in the kernel. The injected shellcode runs in user space and not it the kernel.

  • @nicoladellino8124
    @nicoladellino8124 7 місяців тому

    So impressive, THX bro.

  • @tacolover619
    @tacolover619 Рік тому +3

    Would have liked to see the network and security event logs when you ran commands after the system was vulnerable.

  • @kipchickensout
    @kipchickensout Рік тому

    Didn't expect to see good ol' UC in the video

  • @hbgkev
    @hbgkev 2 місяці тому

    Just to wrap my head around this;
    Drivers are run as system, no surprises here?
    the Intel vulnerable driver is used to load an unsigned driver, the unsigned driver injects code into windows defender,
    why? why do we inject code into defender? Does it provide any utility for us or something?
    I mean like we could inject anywhere? we could just run the shellcode from the driver?

  • @RonyMarcolino
    @RonyMarcolino Рік тому

    Nice video!

  • @JustProgramming45
    @JustProgramming45 Рік тому

    Unbelievable tool I've never seen

  • @SALTINBANK
    @SALTINBANK Рік тому +1

    Great job but be cool to have all your sources

  • @fritsonpetitfrere9038
    @fritsonpetitfrere9038 Рік тому

    Where do I get one of those shirts?

  • @Muziek37414
    @Muziek37414 Рік тому

    Havoc is a fork from Villain right? Just with some extra functions

    • @nordgaren2358
      @nordgaren2358 Рік тому +1

      Villain was written in python. Havoc is Go/C/C++. So I doubt it.

  • @aryangurung30
    @aryangurung30 Рік тому +6

    maldev is the best shit i have come across to learn malware development but their price is just a bit high

  • @web_exit
    @web_exit Рік тому +1

    Hey John, 🎉

    • @web_exit
      @web_exit Рік тому

      Great work 🎉🎉

  • @LoloisKali
    @LoloisKali Рік тому

    Nice shirt john hammond

  • @_hackwell
    @_hackwell Рік тому +1

    Is there a way to make me stop hating windows hacking? Could you make a video about this issue? It seems loads of people are in this state of mind

    • @racecar_johnny
      @racecar_johnny Рік тому

      Bruh that’s what I’m thinking every day. Feel it.

    • @IDJENAwoqqqxdre
      @IDJENAwoqqqxdre Рік тому

      Mission complete > enjoyment until then

  • @weaselwhistle5330
    @weaselwhistle5330 Рік тому

    Professor, if I don't understand this course where I do have to start?
    Could you give me advice from basic step? I have empty brain in IT area.

  • @war-c0mmander
    @war-c0mmander Рік тому +1

    Nice stuff but too expensive for a hobby!

  • @aliakbar307
    @aliakbar307 Рік тому

    Hi, thanks for the great video. I have a question.
    How the shellcode is decrypted and which component will decrypt it?

    • @tanvorn9323
      @tanvorn9323 Рік тому

      The encrypted shellcode basically decrypts itself during runtime

    • @aliakbar307
      @aliakbar307 Рік тому

      @@tanvorn9323 cool. Thanks

  • @AbbottArno-k3c
    @AbbottArno-k3c 3 місяці тому

    Okuneva Expressway

  • @rodricbr
    @rodricbr Рік тому +1

    now this is a cool content I always wanted to see

  • @tomifilep1
    @tomifilep1 2 місяці тому

    and how possible if not installed my computer i mean the intel driver not located in my PC so what

  • @mattcargile
    @mattcargile Рік тому

    Oh now?! Why are you launching cmd?!

  • @stollenjack6699
    @stollenjack6699 Рік тому

    Thanks you

  • @MFoster392
    @MFoster392 Рік тому +2

    Unbelievable man, how long have you been hacking for?

  • @mastercodeon42
    @mastercodeon42 Рік тому

    He sooooo should have played with KDU, its mind blowing cause kdmapped is way old

  • @glaszn
    @glaszn Рік тому

    u m8 are mind blowing :)

  • @nordgaren2358
    @nordgaren2358 Рік тому +1

    I bet all those cheaters on Warzone, or R6 Siege, all have a vulnerable driver installed on their system, to get around the anti-cheat. 🤔

    • @nero2k619
      @nero2k619 Рік тому

      Usually kernel anti-cheats require a driver so in order to bypass the anti-cheat you also need a driver to abuse it.

    • @nordgaren2358
      @nordgaren2358 Рік тому

      @@nero2k619 that is literally what this is...

    • @nordgaren2358
      @nordgaren2358 Рік тому

      @@nero2k619 also, this is highly dependent on the developers to implement the anticheat properly, whether it's in house or third party, into their game.
      But the two games that I mentioned do require kdmapper, or another tool, to install and use a vulnerable driver and load your own driver.

    • @nero2k619
      @nero2k619 Рік тому

      @nordgaren2358 I think you misunderstood me. I know how this all works and how cheat devs bypass anti cheats.

    • @nordgaren2358
      @nordgaren2358 Рік тому

      @@nero2k619 Same. That's why I mentioned that they all have left themselves open, which is nice to think about, because cheaters in those games are extremely frustrating.
      Big problem with newer tech, though. There's been aim-bots that work off output from a capture card, for a few years, now. I've also heard, recently, that hardware memory access using an adapter and an external PC, is starting to become a method for skirting the anti-cheat.
      And then there's companies that don't read the manual, and integrate the anti-cheat into their game in a manner that just requires the user emulate the anti-cheat on the client side, and send a few packets every now and then.
      But the easiest way, by far, is to install a vulnerable driver, and, that is just a bad idea. I'm sure WinPEAS would pick it up, easily.

  • @Slumber_Tales
    @Slumber_Tales 11 місяців тому

    is this binary exploitaion

  • @Mezzosd
    @Mezzosd Рік тому

    Does anyone know how to exit graphical mode in Linux Parrot 5.0?

  • @lukasandresson3990
    @lukasandresson3990 Рік тому +18

    Revoked driver certificates is a thing. Microsoft is working to defend its users.

    • @Pr0xima_audio
      @Pr0xima_audio Рік тому +6

      Shill

    • @Alfred-Neuman
      @Alfred-Neuman Рік тому

      lol

    • @mastercodeon42
      @mastercodeon42 Рік тому

      ​@@nezu_ccYou can actually disable the msft driver block list programmaticly, my program ksDumper 11 does this as a pre-req to leveraging KDU to load the ksDumper driver

    • @zaki_fl
      @zaki_fl Рік тому +3

      comments like this make me want to switch to linux

    • @seansingh4421
      @seansingh4421 Рік тому

      @@zaki_flif you do make sure you use UFW (its not on by default in some distros), SELinux or Apparmor rules and Lynis for audits and you should be fine unless your motherboard UEFI has a critical CVE

  • @elmatheotheo4583
    @elmatheotheo4583 Рік тому

    I love synk ;-)

  • @badrakhariunchimeg1031
    @badrakhariunchimeg1031 11 місяців тому

    love you

  • @P4ul0L
    @P4ul0L Рік тому

    Tell us about MBR Bootkits😅

  • @tanvorn9323
    @tanvorn9323 Рік тому +2

    Kinda pointless if you need admin priv to do it. Might as well use token impersonation technique if you have admin priv to escalate to system which is also less complicated

  • @tysonweber2706
    @tysonweber2706 Рік тому

    250$ for a few months access.................. this feels very seedy

  • @sul3y
    @sul3y Рік тому

    You were already admin when running that shellcode, there’s a million ways to to do shit like become a system or execute c2 payload

  • @elmatheotheo4583
    @elmatheotheo4583 Рік тому

    I like kernel ;-) salam dari indonesia anonym

  • @sedokun200
    @sedokun200 Рік тому +2

    A « mind-blowing » technic that requires to be admin of the machine in the first place. Lol. That’s cool but just when you want to play at home. This is not how it goes in real life within big companies. Hackers are using way more efficient and straightforward procedures.

  • @distortions
    @distortions Рік тому +2

    If you have Cloud Delivered Protection off 90% chance your malware wont get flagged lol.

  • @C5pider
    @C5pider Рік тому +5

    😄

  • @sent4dc
    @sent4dc 11 місяців тому

    hey, that's where script kiddies are made

  • @3rawkz
    @3rawkz Рік тому

    So I just learned about Havoc LMAO.... SOOOOOO since Havoc doesn't seem to have any "auto-pwn" features, is it OSCP-friendly?

    • @somerandomwithacat750
      @somerandomwithacat750 Рік тому

      You don't need a c2 for anything on the oscp.

    • @3rawkz
      @3rawkz Рік тому

      @@somerandomwithacat750 Netcat gets boring lol... I can see the benefit of to use it as way to manage rshells. Seems to automatically upgrades to a 'smart' shell, thats nifty; extendability!! I realize you can do it straight on the terminal but why not? I need to play around with it some more.

  • @k3rn3l_panic81
    @k3rn3l_panic81 Рік тому +1

    This topic is way over hambone's skillset.

  • @insu_na
    @insu_na Рік тому +1

    I am unreasonably angry that they called it "demon" and not "daemon"

  • @saltedhash6467
    @saltedhash6467 Рік тому +1

    John, how much coffee or caffeine did you have before you made this video. You talk so fast. Slow down bro.

  • @ia-maxiweb-nc
    @ia-maxiweb-nc Рік тому

    you speak so fast that I have to slow down the video to 0.75

  • @ronpaul9172
    @ronpaul9172 Рік тому

    Bro....quit sharing our community with skids.