Indirect Syscalls from Userland - AV/EDR/MDR bypass
by losio - Sunday September 17, 2023 at 08:30 PM
#1
Instrumentation callbacks are a post-op syscall hook that allows a user to execute a specified function before the kernel returns execution to the userland process.

Various security products place hooks in user-mode APIs which allow them to redirect execution flow to their engines and detect for suspicious behaviour. The functions in ntdll.dll that make the syscalls consist of just a few assembly instructions, so re-implementing them in your own implant can bypass the triggering of those security product hooks.

More info and credit about this tecnique here:
https://outflank.nl/blog/2019/06/19/red-...ss-av-edr/

Here a simple POC:
Hidden Content
You must register or login to view this content.


Please if you like this share rep me, I have a lot of material on this and if you like it I want to post it all!
Reply
#2
I haven't seen the content yet obviously but I already know of this method and it is useful so thanks for actually bringing useful knowledge for the forum. These are the kinds of things you want to research if your fighting against a stubborn AV. Nothing is perfect but this is helpful especially when using something like this gets you far enough to be able to load your own driver so you can take out the AV.
Reply
#3
(09-17-2023, 08:40 PM)CorpTax Wrote: I haven't seen the content yet obviously but I already know of this method and it is useful so thanks for actually bringing useful knowledge for the forum. These are the kinds of things you want to research if your fighting against a stubborn AV. Nothing is perfect but this is helpful especially when using something like this gets you far enough to be able to load your own driver so you can take out the AV.

thank you so much for the feedback, I also have something tastier maybe post it later!
Reply
#4
this could be useful
Reply
#5
Nice blog, more of this!
Reply
#6
(09-19-2023, 01:24 PM)KaileeLegros Wrote:
(09-17-2023, 08:30 PM)losio Wrote: Instrumentation callbacks are a post-op syscall hook that allows a user to execute a specified function before the kernel returns execution to the userland process.
[...]
Please if you like this share rep me, I have a lot of material on this and if you like it I want to post it all!
any other resource about this topic???

I will now prepare something new on this!
Reply
#7
Good information, can never have to many POC's.
Reply
#8
(09-17-2023, 08:30 PM)losio Wrote: Instrumentation callbacks are a post-op syscall hook that allows a user to execute a specified function before the kernel returns execution to the userland process.

Various security products place hooks in user-mode APIs which allow them to redirect execution flow to their engines and detect for suspicious behaviour. The functions in ntdll.dll that make the syscalls consist of just a few assembly instructions, so re-implementing them in your own implant can bypass the triggering of those security product hooks.

More info and credit about this tecnique here:
https://outflank.nl/blog/2019/06/19/red-...ss-av-edr/

Here a simple POC:


Please if you like this share rep me, I have a lot of material on this and if you like it I want to post it all!

will look into this further, thanks for sharing. PS : post more Smile
Reply
#9
(09-17-2023, 08:30 PM)losio Wrote: Instrumentation callbacks are a post-op syscall hook that allows a user to execute a specified function before the kernel returns execution to the userland process.

Various security products place hooks in user-mode APIs which allow them to redirect execution flow to their engines and detect for suspicious behaviour. The functions in ntdll.dll that make the syscalls consist of just a few assembly instructions, so re-implementing them in your own implant can bypass the triggering of those security product hooks.

More info and credit about this tecnique here:
https://outflank.nl/blog/2019/06/19/red-...ss-av-edr/

Here a simple POC:


Please if you like this share rep me, I have a lot of material on this and if you like it I want to post it all!


thank brother
Reply
#10
Seems interesting!!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  how to easily bypass doors that automatically open from inside shearunnatrckstr 24 2,926 11-21-2023, 02:59 PM
Last Post: s4l1x
  Bypass IP filtering for webserver or phpmyadmin Johnny 16 2,102 11-20-2023, 06:41 AM
Last Post: ibraaaa123
  Crypter service 10 [FREE] privat Crypts bypass Windows Defender hugokopf88 6 737 11-18-2023, 11:17 AM
Last Post: kelvin0991
  FREE Country limit bypass on youtube videos punkyx84 4 952 11-17-2023, 03:24 PM
Last Post: shaheen
  ⭐UPLOAD-4EVER- BYPASS ⭐ PREMIUM LINK GENERATOR ⭐ CyboDevil 26 3,666 11-04-2023, 03:23 AM
Last Post: ashenx



 Users browsing this thread: 1 Guest(s)