xerox
38aa7f29df
|
4 years ago | |
---|---|---|
badeye | 4 years ago | |
battleye.8.17.2020 | 4 years ago | |
README.md | 4 years ago |
README.md
i am writing this atm so come back later
badeye
lsass.exe/csrss.exe
This section will go into detail about what exactly is going on here. csrss.exe/lsass.exe have handles to all processes and since battleye strips the R/W access of the handle that these processes have
to the game it can cause system instability. Thus bedaisy writes two pages of shellcode to both processes and inline hooks NtReadVirtualMemory
and NtWriteVirtualMemory
.
If you run a battleye protected game, open cheat engine, attach to lsass.exe
, and navigate to NtReadVirtualMemory
/NtWriteVirtualMemory
you will see this inline hook...
This inline hook jumps to shellcode that packages all of the parameter values passed to NtReadVirtualMemory
into the stack and then jumps to DeviceIoControl
...
Now that you have a basic understanding of how this system works (and sorta why it is), lets look at what we can do!
To begin we need to extract the driver handle at runtime, this can be done simply by extracting the address of the shellcode out of the inline hook of NtReadVirtualMemory
.