1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
#include "syscall.hpp"
#include <vector>
#include <fstream>
// fuck balloon head
namespace syscall {
file_t c_syscall_mgr::load_ntdll() {
// load ntdll from disk
char path[MAX_PATH];
GetSystemDirectoryA(path, MAX_PATH);
std::string ntdll_path(path);
ntdll_path += xors("\\ntdll.dll");
FILE* file;
if (fopen_s(&file, ntdll_path.c_str(), "rb") != 0)
return file_t{ nullptr, 0 };
fseek(file, 0, SEEK_END);
size_t ntdll_size = ftell(file);
rewind(file);
uint8_t* ntdll = new uint8_t[ntdll_size];
fread(ntdll, ntdll_size, 1, file);
fclose(file);
return file_t{ ntdll, ntdll_size };
}
bool c_syscall_mgr::start() {
// thing
const auto ntdll_file = load_ntdll();
// other thing
const auto ntdll = ntdll_file.first;
const auto ntdll_size = ntdll_file.second;
if (!ntdll)
return false;
// read pe
IMAGE_DOS_HEADER* dos_header = (IMAGE_DOS_HEADER*)(&ntdll[0]);
IMAGE_NT_HEADERS* nt_header = (IMAGE_NT_HEADERS*)(&ntdll[dos_header->e_lfanew]);
if (dos_header->e_magic != IMAGE_DOS_SIGNATURE) {
delete[] ntdll;
return false;
}
if (nt_header->Signature != IMAGE_NT_SIGNATURE) {
delete[] ntdll;
return false;
}
// find section
IMAGE_SECTION_HEADER* section_header = (IMAGE_SECTION_HEADER*)(&ntdll[dos_header->e_lfanew + sizeof(IMAGE_NT_HEADERS)]);
uintptr_t export_rva = nt_header->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress;
uint32_t delta = 0;
for (size_t i = 0; i < nt_header->FileHeader.NumberOfSections; i++) {
if (export_rva > section_header[i].VirtualAddress)
delta = section_header[i].VirtualAddress - section_header[i].PointerToRawData;
}
// aaa exports
IMAGE_EXPORT_DIRECTORY* export_directory = (IMAGE_EXPORT_DIRECTORY*)(&ntdll[export_rva - delta]);
int number_of_functions = export_directory->NumberOfFunctions;
uintptr_t names = export_directory->AddressOfNames - delta;
uintptr_t funcs = export_directory->AddressOfFunctions - delta;
uintptr_t ords = export_directory->AddressOfNameOrdinals - delta;
int i = 0;
for (; i < number_of_functions; i++) {
uint32_t name_rva = *(uint32_t*)(&ntdll[names + i * sizeof(uint32_t)]) - delta;
char* name = (char*)(&ntdll[name_rva]);
uint16_t ordinal = *(uint16_t*)(&ntdll[ords + i * sizeof(uint16_t)]);
uint32_t func_rva = *(uint32_t*)(&ntdll[funcs + ordinal * sizeof(uint32_t)]);
uint32_t func_delta = 0;
for (int j = 0; j < nt_header->FileHeader.NumberOfSections; j++) {
if (func_rva > section_header[j].VirtualAddress)
func_delta = section_header[j].VirtualAddress - section_header[j].PointerToRawData;
}
func_rva -= func_delta;
// okay now this is epic
// this crashed on 8.1 but not on 10?
// weird..
const auto offset = (uintptr_t)ntdll + func_rva;
const auto ntdll_bound = (uintptr_t)ntdll + ntdll_size;
if (offset >= ntdll_bound)
break;
uint32_t code = *(uint32_t*)(&ntdll[func_rva + 0]);
uint32_t index = *(uint32_t*)(&ntdll[func_rva + 4]);
// syscall
if (code == 0xB8D18B4C) {
m_syscalls[hash::fnv1a(name)].set_index(index);
printf("n:%s h:%08x i:%08x\n", name, hash::fnv1a(name), index);
}
}
delete[] ntdll;
// check if we successfully got the syscalls
hash_t hash = fnv("ZwWriteVirtualMemory");
if (m_syscalls.find(hash) != m_syscalls.end())
return m_syscalls[hash].validate();
return false;
}
}
|