merge-requests/1/merge
xerox 4 years ago
commit 7e9420f4e9

@ -10,64 +10,17 @@
### Credit ### Credit
* [cr4sh](https://blog.cr4.sh/) - cr4sh has done something like this a few years back. A link to it can be found [here](https://github.com/Cr4sh/s6_pcie_microblaze/tree/master/python/payloads/DmaBackdoorHv). * [cr4sh](https://blog.cr4.sh/) - cr4sh has done something like this a few years back. A link to it can be found [here](https://github.com/Cr4sh/s6_pcie_microblaze/tree/master/python/payloads/DmaBackdoorHv).
* [btbd](https://github.com/btbd) - offering suggestions and providing input... also stole utils.c/utils.h :thumbsup:
# Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel) # Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)
Voyager is a project designed to offer module injection and vmexit hooking for both AMD & Intel versions of Hyper-V. This project works on all versions of Windows 10-x64 (2004-1511). Voyager is a project designed to offer module injection and vmexit hooking for both AMD & Intel versions of Hyper-V. This project works on all versions of Windows 10-x64 (2004-1511).
The project is currently split into two individual projects, one for Intel and another for AMD.
# Versions & Support # Usage
:o: -> unknown/not tested. Please enable hyper-v in "turn windows features on or off". Then run launch.bat as admin, this will mount the EFI partition and move some files around then reboot you.
:heavy_check_mark: -> tested & working. Voyager is designed to recover from a crash. The first thing Voyager will do when executed is restore bootmgfw on disk. If any complications occur during boot you can simply reboot.
:x: -> tested & not working.
| Winver | AMD | Intel | VM | Bare Metal | <div align="center">
|--------|---------|-------|----|-------| <img src="https://imgur.com/uOpcCp7.png"/>
| 2004 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | </div>
| 1909 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| 1903 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| 1809 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: |
| 1807 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
| 1803 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
| 1709 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
| 1703 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
| 1607 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
| 1511 | :heavy_check_mark: | :heavy_check_mark: | :heavy_check_mark: | :o: |
# Usage
Currently the project is configured in such a way where you replace bootmgfw.efi on your EFI partition with Voyager. This requires secure boot to be disabled. If by any chance
Voyager crashes/something goes wrong simply reboot your computer since bootmgfw.efi is restored instantly. If there are any issues please let me know!
Ensure voyager is renamed to `bootmgfw.efi` and `payload.dll` are all in the same folder as `launch.bat`. Simply run `launch.bat` as admin. Once it has executed, your pc will reboot.
```batch
@echo off
net session >nul 2>&1
if %errorLevel% == 0 (
:: mount the efi partition to X: drive...
mountvol X: /S
:: bootmgfw is a system file so we are going to strip those attributes away...
attrib -s -h X:\EFI\Microsoft\Boot\bootmgfw.efi
:: backup bootmgfw.efi (this is needed for voyager to work since voyager restores bootmgfw.efi)
move X:\EFI\Microsoft\Boot\bootmgfw.efi X:\EFI\Microsoft\Boot\bootmgfw.efi.backup
:: copy payload and bootmgfw.efi to EFI partition...
xcopy %~dp0bootmgfw.efi X:\EFI\Microsoft\Boot\
xcopy %~dp0payload.dll X:\EFI\Microsoft\Boot\
echo press enter to reboot...
pause
:: enable hyper-v and reboot now...
BCDEDIT /Set {current} hypervisorlaunchtype auto
shutdown /r /t 0
) else (
echo Failure: Please run as admin.
pause
)
```
Loading…
Cancel
Save