DriverJack is a tool designed to load a vulnerable driver by abusing lesser-known NTFS techniques.
These method bypass the registration of a Driver Service on the system by hijacking an existing service, and also spoof the image path presented in the Driver Load event.
To further masquerade the presence of a vulnerable driver, the attack also abuses an Emulated Filesystem Read-Only bypass to swap the content of a driver file on a mounted ISO before loading it.
DriverJack abuses the possibility of remapping files mounted on emulated filesystems to RW pages to overwrite their contents. This RO bypass is implemented in IoCdfsLib.
Once the ISO is mounted, the attack proceeds by selecting a service driver that can be started or stopped, or one that can be triggered, requiring administrative privileges unless misconfigured.
This technique exploits the ability of an installer to access the C:\Windows\System32\drivers
directory directly, allowing a malicious symbolic link to be placed there.
The symbolic link is processed by the OS with precedence, leading to the malicious driver being loaded when the service is restarted.
Key Steps:
NtLoadDriver
function normalizes the NT Path of the symbolic link.Developed in collaboration with jonasLyk of the Secret Club hacker collective, this method involves redirecting the \Device\BootDevice
NT symbolic link, part of the path from which a driver binary is loaded.
This allows for the hiding of a rootkit within the system.
Steps:
BootDevice
symlink target.BootDevice
symlink to point to the mounted ISO.BootDevice
symlink target.This method was inspired by techniques used in the unDefender project to disable the Windows Defender service and driver.
The Load Driver event will still show the real path of the driver being loaded, pointing to the ISO mountpoint.
Although widely known, this technique is rarely used due to the potential for system instability.
It involves temporarily changing the drive letter assigned to the BootPartition
, tricking the driver load process to access a different drive.
When combined with NT Symlink Abuse, explained before, this technique can completely masquerade the path of the driver being loaded, bypassing detection by SysMon and other monitoring tools.
DriverJack demonstrates another, non-conventional way for vulnerable driver-loading that leverages CDFS emulated filesystems and lesser-known NTFS symbolic link properties.
Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…
Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…
The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…
Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…
Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…
PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…