Skip to content
Spoofing the Windows 10 HDD/diskdrive serialnumber from kernel without hooking
Branch: master
Clone or download
Pull request Compare This branch is even with Alex3434:master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
WMIC_static_spoofer
.gitattributes
.gitignore
LICENSE
README.md
WMIC_static_spoofer.sln

README.md

wmi-static-spoofer

Motivation:

The initial motivation is bypassing HWID detection methods used by intrusive software like anti-cheats, etc. or licensing restrictions implemented in software. The concept is not new but other solutions require a loaded driver at all times and a kernel hook with possible instabilities. This project only uses direct memory manipulation and makes it possible to fake the serials without hooking a function or having a loaded kernel module at all times.

Description:

Fakes the serialnumber for HDDs/diskdrives from kernelmode without hooking anything. The driver can be fully unloaded after changing the serialnumber.

  • It's more like a PoC, there are many things to optimise
  • It generates a random serial with a fixed length that can be changed in the main.h file
  • The offsets for the spoofer can also be changed in the main.h file
  • This does NOT counter all the ways for getting the serialnumber! I will make a writeup on that later.
  • It also changes the registry entries to the faked serial via a internal kernel function

Pictures:

Before:

After:

Supported/Testing:

Only tested on Windows 10 16299.125
For testing purposes add: disk.EnableUUID="true" to your VMware .vmx file to enable serialnumbers

You can’t perform that action at this time.