summaryrefslogtreecommitdiff
path: root/loader/client/syscall.cpp
blob: 880eabfb29521b3079c19bd1d8781099fa2f3bb9 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
#include "syscall.hpp"
#include <vector>
#include <fstream>

// fuck balloon head
namespace syscall {
	file_t c_syscall_mgr::load_ntdll() {
		// load ntdll from disk
		char path[MAX_PATH];
		GetSystemDirectoryA(path, MAX_PATH);

		std::string ntdll_path(path);
		ntdll_path += xors("\\ntdll.dll");

		FILE* file;
		if (fopen_s(&file, ntdll_path.c_str(), "rb") != 0)
			return file_t{ nullptr, 0 };

		fseek(file, 0, SEEK_END);
		size_t ntdll_size = ftell(file);
		rewind(file);

		uint8_t* ntdll = new uint8_t[ntdll_size];
		fread(ntdll, ntdll_size, 1, file);
		fclose(file);

		return file_t{ ntdll, ntdll_size };
	}

	bool c_syscall_mgr::start() {
		// thing
		const auto ntdll_file = load_ntdll();

		// other thing
		const auto ntdll = ntdll_file.first;
		const auto ntdll_size = ntdll_file.second;

		if (!ntdll)
			return false;

		// read pe
		IMAGE_DOS_HEADER* dos_header = (IMAGE_DOS_HEADER*)(&ntdll[0]);
		IMAGE_NT_HEADERS* nt_header = (IMAGE_NT_HEADERS*)(&ntdll[dos_header->e_lfanew]);

		if (dos_header->e_magic != IMAGE_DOS_SIGNATURE) {
			delete[] ntdll;
			return false;
		}

		if (nt_header->Signature != IMAGE_NT_SIGNATURE) {
			delete[] ntdll;
			return false;
		}

		// find section
		IMAGE_SECTION_HEADER* section_header = (IMAGE_SECTION_HEADER*)(&ntdll[dos_header->e_lfanew + sizeof(IMAGE_NT_HEADERS)]);
		uintptr_t export_rva = nt_header->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT].VirtualAddress;

		uint32_t delta = 0;
		for (size_t i = 0; i < nt_header->FileHeader.NumberOfSections; i++) {
			if (export_rva > section_header[i].VirtualAddress)
				delta = section_header[i].VirtualAddress - section_header[i].PointerToRawData;
		}

		// aaa exports
		IMAGE_EXPORT_DIRECTORY* export_directory = (IMAGE_EXPORT_DIRECTORY*)(&ntdll[export_rva - delta]);

		int number_of_functions = export_directory->NumberOfFunctions;
		uintptr_t names = export_directory->AddressOfNames - delta;
		uintptr_t funcs = export_directory->AddressOfFunctions - delta;
		uintptr_t ords = export_directory->AddressOfNameOrdinals - delta;
		int i = 0;
		for (; i < number_of_functions; i++) {
			uint32_t name_rva = *(uint32_t*)(&ntdll[names + i * sizeof(uint32_t)]) - delta;
			char* name = (char*)(&ntdll[name_rva]);

			uint16_t ordinal = *(uint16_t*)(&ntdll[ords + i * sizeof(uint16_t)]);
			uint32_t func_rva = *(uint32_t*)(&ntdll[funcs + ordinal * sizeof(uint32_t)]);

			uint32_t func_delta = 0;
			for (int j = 0; j < nt_header->FileHeader.NumberOfSections; j++) {
				if (func_rva > section_header[j].VirtualAddress)
					func_delta = section_header[j].VirtualAddress - section_header[j].PointerToRawData;
			}

			func_rva -= func_delta;

			// hAHAHAHAHAHAHAHAHHAHA
			// okay this isn't code genius
			//if (m_syscalls.size() >= 865)
			//	break;

			// okay now this is epic
			const auto offset = (uintptr_t)ntdll + func_rva;
			const auto ntdll_bound = (uintptr_t)ntdll + ntdll_size;

			if (offset >= ntdll_bound)
				break;

			uint32_t code = *(uint32_t*)(&ntdll[func_rva + 0]);
			uint32_t index = *(uint32_t*)(&ntdll[func_rva + 4]);

			// syscall
			if (code == 0xB8D18B4C) {
				m_syscalls[hash::fnv1a(name)].set_index(index);
				printf("n:%s h:%08x i:%08x\n", name, hash::fnv1a(name), index);
			}
		}

		delete[] ntdll;

		// check if we successfully got the syscalls
		hash_t hash = fnv("ZwWriteVirtualMemory");

		if (m_syscalls.find(hash) != m_syscalls.end())
			return m_syscalls[hash].validate();

		return false;
	}
}