Skip to content

IcEy-999/Kernel-Special-APC-ReadProcessMemory

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 

Repository files navigation

通过插入内核特殊APC读取进程内存

Read process memory by inserting kernel special APC

当然了,如何插入内核特殊APC才是该项目的重点,利用内核特殊APC能做到的事情可太多了。

(Of course, how to insert the kernel special APC is the focus of the project. There are too many things that can be done with the kernel special APC.)

优点:

不需要获取进程句柄。不需要挂靠进程(线程)。不需要切换CR3。使目标进程主动帮助我们读取内存。

(There is no need to get a process handle. There is no need to attach a process (thread). There is no need to switch CR3. Make the target process actively help us read the memory.)

缺点:

因为没有创建新的线程在目标进程上下文,所以,读取内存的时间相比挂靠进程(线程)的方式要慢上许多。(但也可以接受)

(Because no new thread is created in the context of the target process, the time of reading memory is much slower than that of attaching process (thread).(But it is also acceptable))

tsapctest

读取速度测试(Read speed test) demo is Ring3_test_demo

KernelSpecialAPC :

读取 1000000 次长度为 30 字节的内存所需时间为:21985 ms

(Time required to read 1000000 times of memory with length of 30 bytes: 21985 ms)

ReadProcessMemory:

读取1000000 次长度为 30 字节的内存所需时间为:890 ms

(The time required to read 1000000 times of memory with a length of 30 bytes is: 890 ms)

当进程全部线程被挂起时,无法读取内存!

(Cannot read memory when all threads of the process are suspended!)

需要修改的地方(What needs to be modified)

一、 kernel_special_APC.c

VOID Apc_Init() {
	PULONG64 P_KeInitializeApc = (PULONG64)&KeInitializeApc;
	PULONG64 P_KeInsertQueueApc = (PULONG64)&KeInsertQueueApc;

	//填入KeInitializeApc函数地址
	*P_KeInitializeApc = 0xfffff8042b62a530;

	//填入KeInsertQueueApc函数地址
	*P_KeInsertQueueApc = 0xfffff8042b63dc10;
}

二、Process_Thread.h

enum  Eprocess_Members_Offset //自己想办法获取进程结构偏移
{
	ThreadListHead = 0x30,//线程链表
	ProcessListEntry = 0x240,//进程链表
	UniqueProcessId = 0x2e0,//进程PID

};

enum Ethread_Members_Offset //自己想办法获取线程结构偏移
{
	Running = 0x71,
	SpecialApcDisable = 0x1e6,
	ThreadListEntry = 0x2f8,
};

关于如何动态获取上述 函数地址 和 结构偏移,请查看我的另一个项目:Ntoskrnl_Viewer

For how to dynamically obtain the above function address and structure offset, please see my other project:Ntoskrnl_Viewer

About

Example of reading process memory through kernel special APC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published