Skip to content

Example of hijacking system calls via function pointer tables

Notifications You must be signed in to change notification settings

anzelesnik/MySyscall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

MySyscall

This project demonstrates the use of apfnSimpleCall, a function pointer table inside win32kfull.sys (which is only partially protected by PatchGuard), to hijack a specific group of system calls. This allows a potentional attacker to maintain stealthier communication between a user mode application and kernel code.

Writeup

https://lesnik.cc/mysyscall-hijacking-windows-system-calls-for-personal-use/

About

Example of hijacking system calls via function pointer tables

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages