Skip to content

cchochoy/e1000_fake_driver

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

60 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

e1000_fake_driver

Description

Implementation of a fake e1000 driver exploiting CVE-2018-3295 Virtualbox vulnerability for a school project. This project was realized following the instructions of the security searcher who found the vulnerability and described it here : https://github.com/MorteNoir1/virtualbox_e1000_0day

Installation

$ ./install.sh

Only own version build are supported yet. Please choose own and debug to build your debug version.

Warning : During the process an error can occur, especially during the sources compilation. You can have something like "Exit with error status 2."

Please contact us at nicolas.dureisseix@etu.enseeiht.fr if an error occurs.

Debug

Use RTLogPrintf(string, args) to print debug message. The debug will go into .log files in VirtualBox folder.

Look into the files :

  • src/VBox/Devices/Network/DevE1000 .cpp / .h ;

  • src/VBox/Devices/Network/DevEEPROM .cpp / .h.

You can use cleanlog script to clean all logs and printlog to print them in the console.

VM

There is not script for VM creation/management yet. Please create a VM called ProjetLong with 2CPU Cores and 8Gb RAM.

Download fake_driver folder into the VM and run load_fake_driver. Use reload_fake_driver if you have already load the driver and you want to apply changes.

Note

Some scripts will arrive to make it easier for users, on VM and VMM.

About

Fake e1000 driver exploiting Virtualbox Guest-to-Host vulnerability

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published