A forum for reverse engineering, OS internals and malware analysis 

Search found 20 matches: j00ru

Searched query: j00ru

 Go to advanced search

Re: SSDT Shadow Hook

 by Tigzy ¦  Thu Aug 18, 2011 11:01 am ¦  Forum: Newbie Questions ¦  Topic: SSDT Shadow Hook ¦  Replies: 47 ¦  Views: 56653

Ok thanks. One last thing, on the link http://j00ru.vexillium.org/win32k_syscalls/ , the system calls are on 4*4 bits, but in the hardcoded sample, we have only 3*4 bits. The first "1" which is on every syscall is missing. So where has it gone? ...

Re: SSDT Shadow Hook

 by Alex ¦  Wed Aug 17, 2011 6:58 pm ¦  Forum: Newbie Questions ¦  Topic: SSDT Shadow Hook ¦  Replies: 47 ¦  Views: 56653

Here is a list with indexes of SSDT of different OS'es - Windows WIN32K.SYS System Call Table (NT/2000/XP/2003/Vista/2008/7) and here is an example how to hook SSDT - HookShadowSSDT.rar and finally some description Chapter 5 - Monitoring Native API Calls (source - Undocumented Windows 2000 Secrets ).

Re: question

 by r2nwcnydc ¦  Wed May 18, 2011 1:06 pm ¦  Forum: Newbie Questions ¦  Topic: question ¦  Replies: 2 ¦  Views: 4917

http://j00ru.wordpress.com/2009/07/04/dllmain-and-its-uncovered-possibilites/ Has some ideas about how the parameter may be used. •Passing information between two or more static modules As Gynvael Coldwind suggested, the fact ...

Re: best method to dump process

 by Alex ¦  Sun Apr 10, 2011 3:31 pm ¦  Forum: Newbie Questions ¦  Topic: best method to dump process ¦  Replies: 9 ¦  Views: 13654

Here is a j00ru's TraceHook v0.0.1 which try to dump whole process's user mode address space. i think should use NtXxx function address directly You can't be sure that NtXxx functions are safe, before using them as any other significant ...

Re: MemMAP v0.1.2

 by j00ru ¦  Sat Oct 09, 2010 8:38 pm ¦  Forum: Tools/Software ¦  Topic: MemMAP v0.1.2 ¦  Replies: 5 ¦  Views: 14673

... plans on sharing the source? Let me enclose two kernel screenshots from the Windows XP SP3 and Windows Vista SP2 kernels ;) Windows XP SP3: http://j00ru.vexillium.org/dump/Windows_XP_SP3.PNG Windows Vista SP2: http://j00ru.vexillium.org/dump/Windows_Vista_SP2.PNG Overall, good job ;)

MemMAP v0.1.2

 by a_d_13 ¦  Sat Oct 09, 2010 7:47 pm ¦  Forum: Tools/Software ¦  Topic: MemMAP v0.1.2 ¦  Replies: 5 ¦  Views: 14673

Hello, MemMAP is a tool inspired by j00ru's KernelMAP (see here ). I've written my own version with a couple more interesting features. A list follows: More memory types included (kernel thread stacks and GDI objects) Ability to visualize the ...

Device Driver Development for Beginners - Reloaded

 by Evilcry ¦  Mon Oct 04, 2010 6:14 am ¦  Forum: Kernel-Mode Development ¦  Topic: Device Driver Development for Beginners - Reloaded ¦  Replies: 24 ¦  Views: 112999

... • microsoft.public.win32.programmer.kernel • microsoft.public.windbg KernelmodeInfo Blog CURRENT_IRQL :-) j00ru//vx tech blog Coding, reverse engineering, OS internals Blog http://j00ru.vexillium.org/ Nynaeve http://www.nynaeve.net/ DumpAnalysis Blog http://www.dumpanalysis.org/ ...

runtime decompiling,decoding,Data and type analysis...

 by Not_ice ¦  Mon Aug 16, 2010 6:14 am ¦  Forum: User-Mode Development ¦  Topic: runtime decompiling,decoding,Data and type analysis... ¦  Replies: 0 ¦  Views: 4625

a Small project I've been working on for a long time called Sin32 which is a LPC/(L)RPC server If you want to know more about LPC see j00ru's posting about csrss, or my Posting about minimal RPC,or my various posts about Sin32 on http://www.woodmann.com . I recently found this open source ...

Re: What's this? Anyone?

 by Every1is= ¦  Sat Aug 07, 2010 8:45 pm ¦  Forum: Malware ¦  Topic: What's this? Anyone? ¦  Replies: 30 ¦  Views: 32784

... crash, guess what? The exact same screen corruption occured, the BSOD with the F-whatever error came up and a minidump was saved. Over here http://j00ru.vexillium.org/ I was reading up on csrss.exe (but it is over my head to be honest, I just cannot connect the dots as a non programmer, but maybe ...

GDT and LDT in Windows kernel vulnerability exploitation

 by Dreg ¦  Mon Mar 15, 2010 8:50 am ¦  Forum: Reverse Engineering and Debugging ¦  Topic: GDT and LDT in Windows kernel vulnerability exploitation ¦  Replies: 0 ¦  Views: 6261

... code privilege from user-land to ring0. The idea was turned into some PoC exploits, and finally, into the paper presented below..." by Matthew "j00ru" Jurczyk and Gynvael Coldwind: http://vexillium.org/dl.php?call_gate_exploitation.pdf <- Paper http://vexillium.org/dl.php?ldtsource.zip <- Source ...