Skip to content
This repository has been archived by the owner on Aug 4, 2024. It is now read-only.

Add CPUID Password-Protected Backdoor for Hypervisor Communication #20

Closed
memN0ps opened this issue May 8, 2024 · 0 comments
Closed
Assignees
Labels
enhancement New feature or request
Milestone

Comments

@memN0ps
Copy link
Owner

memN0ps commented May 8, 2024

Implement a CPUID password-protected backdoor to communicate with the hypervisor from user-mode and perform certain tasks. This feature could include:

  • Telling the hypervisor to perform hooks or unhooks.
  • Other tasks as required.

This enhancement will allow secure communication with the hypervisor for specialized tasks.

@memN0ps memN0ps added the enhancement New feature or request label May 8, 2024
@memN0ps memN0ps added this to the Charlie milestone May 8, 2024
@memN0ps memN0ps self-assigned this May 8, 2024
@memN0ps memN0ps modified the milestones: Charlie, Bravo May 8, 2024
memN0ps added a commit that referenced this issue May 17, 2024
- Need to handle the requests in the UEFI hypervisor.
- The enhancement issue #20 is half-way complete.
- Testing is required too.
memN0ps added a commit that referenced this issue May 17, 2024
- If we hook same function multiple times then it overwrites the vmcall instruction with another vmcall instruction, which should be fixed but it does not crash it at least.

- Need to test multiple hooks on same page and different pages. Especially those that cause less vmexits to easily see.

- Solves #20
memN0ps added a commit that referenced this issue May 18, 2024
- This is untested #20 and requires testing for multiple hooks, especially on the same page.
@memN0ps memN0ps closed this as completed May 21, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant