<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>GDT / LDT Windows Kernel Exploitation article</title>
                            <pubDate>Sat, 16 Jan 2010 19:01:29 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1541/GDT_/_LDT_Windows_Kernel_Exploitation_article</link>
                                        <author>j00ru &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi,&lt;br /&gt;
&lt;br /&gt;
A few weeks ago, me and Gynvael had a chance to dive into the Global/Local Descriptor Table management in 32-bit Windows, and how it can be used to accomplish something, in the context of write-what-where ring-0 exploitation.&lt;br /&gt;
&lt;br /&gt;
To sum-up everything we've came across during this research, a &amp;quot;GDT and LDT in Windows kernel vulnerability exploitation&amp;quot; paper was created.&lt;br /&gt;
&lt;br /&gt;
Table of Contents:&lt;br /&gt;
1. Abstract&lt;br /&gt;
2. The need of a stable exploit path&lt;br /&gt;
3. Windows GDT and LDT&lt;br /&gt;
4. Creating a Call-Gate entry in LDT&lt;br /&gt;
4.1. 4-byte write-what-where exploitation&lt;br /&gt;
4.2. 1-byte write-what-where exploitation&lt;br /&gt;
4.3. Custom LDT goes User Mode&lt;br /&gt;
5. Summary&lt;br /&gt;
+ References&lt;br /&gt;
+ Attachments&lt;br /&gt;
&lt;br /&gt;
My blog entry: &lt;a href=&quot;http://j00ru.vexillium.org/?p=290&amp;amp;lang=en&quot;&gt;http://j00ru.vexillium.org/?p=290&amp;amp;lang=en&lt;/a&gt;&lt;br /&gt;
Gynvael blog:&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://gynvael.coldwind.pl/?id=274&quot;&gt;http://gynvael.coldwind.pl/?id=274&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The article itself: &lt;a href=&quot;http://vexillium.org/dl.php?call_gate_exploitation.pdf&quot;&gt;http://vexillium.org/dl.php?call_gate_exploitation.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Have fun!</description>
                    </item>
                <item>
            <title>x86 Kernel Memory Space Visualization</title>
                            <pubDate>Mon, 04 Jan 2010 16:24:30 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1533/x86_Kernel_Memory_Space_Visualization</link>
                                        <author>j00ru &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hello!&lt;br /&gt;
&lt;br /&gt;
Just a quick info: recently I have been playing a little bit with retrieving kernel-mode addresses from the application (ring-3) level. The first result of this small research is a visualization tool called KernelMAP v0.0.1, that aims to gather as much information about the kernel memory layout as possible and present it to the user in somewhat attractive manner.&lt;br /&gt;
&lt;br /&gt;
You can find more information on my blog, &lt;a href=&quot;http://j00ru.vexillium.org/?p=269&amp;amp;lang=en&quot;&gt;HERE&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Some screenshots of the app:&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/blog/04_01_10/small/Windows_XP_SP3.png&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/blog/04_01_10/small/Windows_Vista_SP2.png&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/blog/04_01_10/small/Windows_7_SP0.png&quot; border=0 align=&quot;&quot;&gt;</description>
                    </item>
                <item>
            <title>WIN32k.SYS System Call Table</title>
                            <pubDate>Wed, 11 Nov 2009 11:59:35 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1520/WIN32k.SYS_System_Call_Table</link>
                                        <author>j00ru &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi,&lt;br /&gt;
&lt;br /&gt;
I have recently created a pre-alpha version of a Windows graphical syscall table. As for now, it contains more or less the latest Windows versions, however the list is going to be continuously supplemented with new data.&lt;br /&gt;
&lt;br /&gt;
You can read more @ my original blog post: &lt;a href=&quot;http://j00ru.vexillium.org/?p=257&amp;amp;lang=en&quot;&gt;http://j00ru.vexillium.org/?p=257&amp;amp;lang=en&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Have fun!</description>
                    </item>
                <item>
            <title>TraceHook v0.0.1 release</title>
                            <pubDate>Sun, 30 Aug 2009 07:19:09 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/1494/TraceHook_v0.0.1_release</link>
                                        <author>j00ru &lt;email-suppressed@example.com&gt;</author>
                                                    <description>I have recently released a small project called TraceHook.&lt;br /&gt;
It is supposed to control the CreateProcess/TerminateProcess events and dump the desired processes if marked as malware, from kernel-mode. &lt;br /&gt;
&lt;br /&gt;
There is still really much to do, but still I wanted to share the current piece of code - any comments are very welcome!&lt;br /&gt;
&lt;br /&gt;
You can read more about it &lt;a href=&quot;http://j00ru.vexillium.org/?lang=en&quot;&gt;on my blog&lt;/a&gt; ;&amp;gt;</description>
                    </item>
                <item>
            <title>FPU Tracer v0.0.1 released</title>
                            <pubDate>Mon, 28 Jan 2008 12:01:33 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1038/FPU_Tracer_v0.0.1_released</link>
                                        <author>j00ru &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hello,&lt;br /&gt;
&lt;br /&gt;
Now the time has come for another post ;-) &lt;br /&gt;
I want to present a tool written by myself, in the original purpose, to help me with solving the HackerChallenge Phase3 - reversing the target executable ;&amp;gt; &lt;br /&gt;
But as some people found it a useful program, I decided to fix some known bugs and implement new features. &lt;br /&gt;
&lt;br /&gt;
The main aim of Float Tracer is to monitor the specific process' execution and log the occurences of FPU instructions, showing its dissassembly, address, optionally modified STx value etc. &lt;br /&gt;
It can also mark the immediate values you specify, as well as instructions, value ranges of ST0-ST7 registers and so on ;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As for now, it's a closed-source project. If anyone would be interested in my further development, I'll rewrite most of the code (to make it look like and work better), fix reported bugs, add some new options and generally publish the sources.&lt;br /&gt;
What is important - keep in mind it is 0.0.1 version, so I'm sure it must have a number of bugs. In case of you finding one, just mail me ;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The package can be downloaded from: &lt;a href=&quot;http://vexillium.org/?sec&quot;&gt;http://vexillium.org/?sec&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Aaaand some screenshots, of course (trace working on Phase1 and Phase3 HC executables ;-))&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/FPU_Tracer/screenshots/Phase1Log.PNG&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/FPU_Tracer/screenshots/Phase1Info.PNG&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/FPU_Tracer/screenshots/Phase3Log.PNG&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://j00ru.vexillium.org/FPU_Tracer/screenshots/Phase3Info.PNG&quot; border=0 align=&quot;&quot;&gt;</description>
                    </item>
            </channel>
</rss>
