zoukankan      html  css  js  c++  java
  • 分析ReadProcessMemory如何进入R0【下】逆向分析 KiSystemService

    分析ReadProcessMemory如何进入R0【下】

    一、回顾

    上节我们学习API系统调用在R3部分做的事情,2种方式进入R0,(中断门和快速调用),分别调用两个不同的函

    数,KiSystemService,和 KiFastCallEntry.接下来我们来逆向分析KiSystemService.

    逆向分析之前,思考四个问题:

      1)进0环后,原来的寄存器存在哪里?

      2)如何根据系统调用号(eax中存储)找到要执行的内核函数?

      3)调用时参数是存储到3环的堆栈,如何传递给内核函数?

      4)2种调用方式是如何返回到3环的?

    要分析 KiSystemService之前,我们需要先了解几个结构体,_Trap_Frame,_ETHREAD,_KTHREAD,_KPCR

    ,_NT_TIB 和 _KPRCB。

    二、_KTRAP_FRAME

    kd> dt _KTRAP_FRAME
    ntdll!_KTRAP_FRAME
       +0x000 DbgEbp           : Uint4B
       +0x004 DbgEip           : Uint4B
       +0x008 DbgArgMark       : Uint4B
       +0x00c DbgArgPointer    : Uint4B
       +0x010 TempSegCs        : Uint4B
       +0x014 TempEsp          : Uint4B
       +0x018 Dr0              : Uint4B
       +0x01c Dr1              : Uint4B
       +0x020 Dr2              : Uint4B
       +0x024 Dr3              : Uint4B
       +0x028 Dr6              : Uint4B
       +0x02c Dr7              : Uint4B
       +0x030 SegGs            : Uint4B
       +0x034 SegEs            : Uint4B
       +0x038 SegDs            : Uint4B
       +0x03c Edx              : Uint4B
       +0x040 Ecx              : Uint4B
       +0x044 Eax              : Uint4B
       +0x048 PreviousPreviousMode : Uint4B
       +0x04c ExceptionList    : Ptr32 _EXCEPTION_REGISTRATION_RECORD
       +0x050 SegFs            : Uint4B
       +0x054 Edi              : Uint4B
       +0x058 Esi              : Uint4B
       +0x05c Ebx              : Uint4B
       +0x060 Ebp              : Uint4B
       +0x064 ErrCode          : Uint4B
       +0x068 Eip              : Uint4B
       +0x06c SegCs            : Uint4B
       +0x070 EFlags           : Uint4B
       +0x074 HardwareEsp      : Uint4B
       +0x078 HardwareSegSs    : Uint4B
       +0x07c V86Es            : Uint4B
       +0x080 V86Ds            : Uint4B
       +0x084 V86Fs            : Uint4B
       +0x088 V86Gs            : Uint4B
    

    三、_KPCR, _NT_TIB, _KPRCB

    这三个结构体存储了当前CPU的信息,其实这三个结构体是一个结构体,只不过抽象成三部分而已。

    _KPCR

    KPCR 是CPU控制区的意思,每个CPU每核都有一个KPCR结构。

    kd> dt _KPCR
    nt!_KPCR
       +0x000 NtTib            : _NT_TIB
       +0x01c SelfPcr          : Ptr32 _KPCR
       +0x020 Prcb             : Ptr32 _KPRCB
       +0x024 Irql             : UChar
       +0x028 IRR              : Uint4B
       +0x02c IrrActive        : Uint4B
       +0x030 IDR              : Uint4B
       +0x034 KdVersionBlock   : Ptr32 Void
       +0x038 IDT              : Ptr32 _KIDTENTRY
       +0x03c GDT              : Ptr32 _KGDTENTRY
       +0x040 TSS              : Ptr32 _KTSS
       +0x044 MajorVersion     : Uint2B
       +0x046 MinorVersion     : Uint2B
       +0x048 SetMember        : Uint4B
       +0x04c StallScaleFactor : Uint4B
       +0x050 DebugActive      : UChar
       +0x051 Number           : UChar
       +0x052 Spare0           : UChar
       +0x053 SecondLevelCacheAssociativity : UChar
       +0x054 VdmAlert         : Uint4B
       +0x058 KernelReserved   : [14] Uint4B
       +0x090 SecondLevelCacheSize : Uint4B
       +0x094 HalReserved      : [16] Uint4B
       +0x0d4 InterruptMode    : Uint4B
       +0x0d8 Spare1           : UChar
       +0x0dc KernelReserved2  : [17] Uint4B
       +0x120 PrcbData         : _KPRCB
    
    _NT_TIB

    主要保存了SEH结构化异常链表和一个指向自己的指针

    kd> dt _NT_TIB
    ntdll!_NT_TIB
       +0x000 ExceptionList    : Ptr32 _EXCEPTION_REGISTRATION_RECORD
       +0x004 StackBase        : Ptr32 Void
       +0x008 StackLimit       : Ptr32 Void
       +0x00c SubSystemTib     : Ptr32 Void
       +0x010 FiberData        : Ptr32 Void
       +0x010 Version          : Uint4B
       +0x014 ArbitraryUserPointer : Ptr32 Void
       +0x018 Self             : Ptr32 _NT_TIB
    
    _KPRCB
    kd> dt _KPRCB
    ntdll!_KPRCB
       +0x000 MinorVersion     : Uint2B
       +0x002 MajorVersion     : Uint2B
       +0x004 CurrentThread    : Ptr32 _KTHREAD
       +0x008 NextThread       : Ptr32 _KTHREAD
       +0x00c IdleThread       : Ptr32 _KTHREAD
       +0x010 Number           : Char
       +0x011 Reserved         : Char
       +0x012 BuildType        : Uint2B
       +0x014 SetMember        : Uint4B
       +0x018 CpuType          : Char
       +0x019 CpuID            : Char
       +0x01a CpuStep          : Uint2B
       +0x01c ProcessorState   : _KPROCESSOR_STATE
       +0x33c KernelReserved   : [16] Uint4B
       +0x37c HalReserved      : [16] Uint4B
       +0x3bc PrcbPad0         : [92] UChar
       +0x418 LockQueue        : [16] _KSPIN_LOCK_QUEUE
       +0x498 PrcbPad1         : [8] UChar
       +0x4a0 NpxThread        : Ptr32 _KTHREAD
       +0x4a4 InterruptCount   : Uint4B
       +0x4a8 KernelTime       : Uint4B
       +0x4ac UserTime         : Uint4B
       +0x4b0 DpcTime          : Uint4B
       +0x4b4 DebugDpcTime     : Uint4B
       +0x4b8 InterruptTime    : Uint4B
       +0x4bc AdjustDpcThreshold : Uint4B
       +0x4c0 PageColor        : Uint4B
       +0x4c4 SkipTick         : Uint4B
       +0x4c8 MultiThreadSetBusy : UChar
       +0x4c9 Spare2           : [3] UChar
       +0x4cc ParentNode       : Ptr32 _KNODE
       +0x4d0 MultiThreadProcessorSet : Uint4B
       +0x4d4 MultiThreadSetMaster : Ptr32 _KPRCB
       +0x4d8 ThreadStartCount : [2] Uint4B
       +0x4e0 CcFastReadNoWait : Uint4B
       +0x4e4 CcFastReadWait   : Uint4B
       +0x4e8 CcFastReadNotPossible : Uint4B
       +0x4ec CcCopyReadNoWait : Uint4B
       +0x4f0 CcCopyReadWait   : Uint4B
       +0x4f4 CcCopyReadNoWaitMiss : Uint4B
       +0x4f8 KeAlignmentFixupCount : Uint4B
       +0x4fc KeContextSwitches : Uint4B
       +0x500 KeDcacheFlushCount : Uint4B
       +0x504 KeExceptionDispatchCount : Uint4B
       +0x508 KeFirstLevelTbFills : Uint4B
       +0x50c KeFloatingEmulationCount : Uint4B
       +0x510 KeIcacheFlushCount : Uint4B
       +0x514 KeSecondLevelTbFills : Uint4B
       +0x518 KeSystemCalls    : Uint4B
       +0x51c SpareCounter0    : [1] Uint4B
       +0x520 PPLookasideList  : [16] _PP_LOOKASIDE_LIST
       +0x5a0 PPNPagedLookasideList : [32] _PP_LOOKASIDE_LIST
       +0x6a0 PPPagedLookasideList : [32] _PP_LOOKASIDE_LIST
       +0x7a0 PacketBarrier    : Uint4B
       +0x7a4 ReverseStall     : Uint4B
       +0x7a8 IpiFrame         : Ptr32 Void
       +0x7ac PrcbPad2         : [52] UChar
       +0x7e0 CurrentPacket    : [3] Ptr32 Void
       +0x7ec TargetSet        : Uint4B
       +0x7f0 WorkerRoutine    : Ptr32     void 
       +0x7f4 IpiFrozen        : Uint4B
       +0x7f8 PrcbPad3         : [40] UChar
       +0x820 RequestSummary   : Uint4B
       +0x824 SignalDone       : Ptr32 _KPRCB
       +0x828 PrcbPad4         : [56] UChar
       +0x860 DpcListHead      : _LIST_ENTRY
       +0x868 DpcStack         : Ptr32 Void
       +0x86c DpcCount         : Uint4B
       +0x870 DpcQueueDepth    : Uint4B
       +0x874 DpcRoutineActive : Uint4B
       +0x878 DpcInterruptRequested : Uint4B
       +0x87c DpcLastCount     : Uint4B
       +0x880 DpcRequestRate   : Uint4B
       +0x884 MaximumDpcQueueDepth : Uint4B
       +0x888 MinimumDpcRate   : Uint4B
       +0x88c QuantumEnd       : Uint4B
       +0x890 PrcbPad5         : [16] UChar
       +0x8a0 DpcLock          : Uint4B
       +0x8a4 PrcbPad6         : [28] UChar
       +0x8c0 CallDpc          : _KDPC
       +0x8e0 ChainedInterruptList : Ptr32 Void
       +0x8e4 LookasideIrpFloat : Int4B
       +0x8e8 SpareFields0     : [6] Uint4B
       +0x900 VendorString     : [13] UChar
       +0x90d InitialApicId    : UChar
       +0x90e LogicalProcessorsPerPhysicalProcessor : UChar
       +0x910 MHz              : Uint4B
       +0x914 FeatureBits      : Uint4B
       +0x918 UpdateSignature  : _LARGE_INTEGER
       +0x920 NpxSaveArea      : _FX_SAVE_AREA
       +0xb30 PowerState       : _PROCESSOR_POWER_STATE
    

    四、_ETHREAD, _KTHREAD

    这俩其实也是同一个结构体,_KPRCB + 0x04 里用到 _KTHREAD。这俩结构体存储的是线程相关的信息

    #####_ETHREAD
    kd> dt _ETHREAD
    ntdll!_ETHREAD
       +0x000 Tcb              : _KTHREAD
       +0x1c0 CreateTime       : _LARGE_INTEGER
       +0x1c0 NestedFaultCount : Pos 0, 2 Bits
       +0x1c0 ApcNeeded        : Pos 2, 1 Bit
       +0x1c8 ExitTime         : _LARGE_INTEGER
       +0x1c8 LpcReplyChain    : _LIST_ENTRY
       +0x1c8 KeyedWaitChain   : _LIST_ENTRY
       +0x1d0 ExitStatus       : Int4B
       +0x1d0 OfsChain         : Ptr32 Void
       +0x1d4 PostBlockList    : _LIST_ENTRY
       +0x1dc TerminationPort  : Ptr32 _TERMINATION_PORT
       +0x1dc ReaperLink       : Ptr32 _ETHREAD
       +0x1dc KeyedWaitValue   : Ptr32 Void
       +0x1e0 ActiveTimerListLock : Uint4B
       +0x1e4 ActiveTimerListHead : _LIST_ENTRY
       +0x1ec Cid              : _CLIENT_ID
       +0x1f4 LpcReplySemaphore : _KSEMAPHORE
       +0x1f4 KeyedWaitSemaphore : _KSEMAPHORE
       +0x208 LpcReplyMessage  : Ptr32 Void
       +0x208 LpcWaitingOnPort : Ptr32 Void
       +0x20c ImpersonationInfo : Ptr32 _PS_IMPERSONATION_INFORMATION
       +0x210 IrpList          : _LIST_ENTRY
       +0x218 TopLevelIrp      : Uint4B
       +0x21c DeviceToVerify   : Ptr32 _DEVICE_OBJECT
       +0x220 ThreadsProcess   : Ptr32 _EPROCESS
       +0x224 StartAddress     : Ptr32 Void
       +0x228 Win32StartAddress : Ptr32 Void
       +0x228 LpcReceivedMessageId : Uint4B
       +0x22c ThreadListEntry  : _LIST_ENTRY
       +0x234 RundownProtect   : _EX_RUNDOWN_REF
       +0x238 ThreadLock       : _EX_PUSH_LOCK
       +0x23c LpcReplyMessageId : Uint4B
       +0x240 ReadClusterSize  : Uint4B
       +0x244 GrantedAccess    : Uint4B
       +0x248 CrossThreadFlags : Uint4B
       +0x248 Terminated       : Pos 0, 1 Bit
       +0x248 DeadThread       : Pos 1, 1 Bit
       +0x248 HideFromDebugger : Pos 2, 1 Bit
       +0x248 ActiveImpersonationInfo : Pos 3, 1 Bit
       +0x248 SystemThread     : Pos 4, 1 Bit
       +0x248 HardErrorsAreDisabled : Pos 5, 1 Bit
       +0x248 BreakOnTermination : Pos 6, 1 Bit
       +0x248 SkipCreationMsg  : Pos 7, 1 Bit
       +0x248 SkipTerminationMsg : Pos 8, 1 Bit
       +0x24c SameThreadPassiveFlags : Uint4B
       +0x24c ActiveExWorker   : Pos 0, 1 Bit
       +0x24c ExWorkerCanWaitUser : Pos 1, 1 Bit
       +0x24c MemoryMaker      : Pos 2, 1 Bit
       +0x250 SameThreadApcFlags : Uint4B
       +0x250 LpcReceivedMsgIdValid : Pos 0, 1 Bit
       +0x250 LpcExitThreadCalled : Pos 1, 1 Bit
       +0x250 AddressSpaceOwner : Pos 2, 1 Bit
       +0x254 ForwardClusterOnly : UChar
       +0x255 DisablePageFaultClustering : UChar
    
    _KTHREAD
    
    kd> dt _KTHREAD
    ntdll!_KTHREAD
       +0x000 Header           : _DISPATCHER_HEADER
       +0x010 MutantListHead   : _LIST_ENTRY
       +0x018 InitialStack     : Ptr32 Void
       +0x01c StackLimit       : Ptr32 Void
       +0x020 Teb              : Ptr32 Void
       +0x024 TlsArray         : Ptr32 Void
       +0x028 KernelStack      : Ptr32 Void
       +0x02c DebugActive      : UChar
       +0x02d State            : UChar
       +0x02e Alerted          : [2] UChar
       +0x030 Iopl             : UChar
       +0x031 NpxState         : UChar
       +0x032 Saturation       : Char
       +0x033 Priority         : Char
       +0x034 ApcState         : _KAPC_STATE
       +0x04c ContextSwitches  : Uint4B
       +0x050 IdleSwapBlock    : UChar
       +0x051 VdmSafe          : UChar
       +0x052 Spare0           : [2] UChar
       +0x054 WaitStatus       : Int4B
       +0x058 WaitIrql         : UChar
       +0x059 WaitMode         : Char
       +0x05a WaitNext         : UChar
       +0x05b WaitReason       : UChar
       +0x05c WaitBlockList    : Ptr32 _KWAIT_BLOCK
       +0x060 WaitListEntry    : _LIST_ENTRY
       +0x060 SwapListEntry    : _SINGLE_LIST_ENTRY
       +0x068 WaitTime         : Uint4B
       +0x06c BasePriority     : Char
       +0x06d DecrementCount   : UChar
       +0x06e PriorityDecrement : Char
       +0x06f Quantum          : Char
       +0x070 WaitBlock        : [4] _KWAIT_BLOCK
       +0x0d0 LegoData         : Ptr32 Void
       +0x0d4 KernelApcDisable : Uint4B
       +0x0d8 UserAffinity     : Uint4B
       +0x0dc SystemAffinityActive : UChar
       +0x0dd PowerState       : UChar
       +0x0de NpxIrql          : UChar
       +0x0df InitialNode      : UChar
       +0x0e0 ServiceTable     : Ptr32 Void
       +0x0e4 Queue            : Ptr32 _KQUEUE
       +0x0e8 ApcQueueLock     : Uint4B
       +0x0f0 Timer            : _KTIMER
       +0x118 QueueListEntry   : _LIST_ENTRY
       +0x120 SoftAffinity     : Uint4B
       +0x124 Affinity         : Uint4B
       +0x128 Preempted        : UChar
       +0x129 ProcessReadyQueue : UChar
       +0x12a KernelStackResident : UChar
       +0x12b NextProcessor    : UChar
       +0x12c CallbackStack    : Ptr32 Void
       +0x130 Win32Thread      : Ptr32 Void
       +0x134 TrapFrame        : Ptr32 _KTRAP_FRAME
       +0x138 ApcStatePointer  : [2] Ptr32 _KAPC_STATE
       +0x140 PreviousMode     : Char
       +0x141 EnableStackSwap  : UChar
       +0x142 LargeStack       : UChar
       +0x143 ResourceIndex    : UChar
       +0x144 KernelTime       : Uint4B
       +0x148 UserTime         : Uint4B
       +0x14c SavedApcState    : _KAPC_STATE
       +0x164 Alertable        : UChar
       +0x165 ApcStateIndex    : UChar
       +0x166 ApcQueueable     : UChar
       +0x167 AutoAlignment    : UChar
       +0x168 StackBase        : Ptr32 Void
       +0x16c SuspendApc       : _KAPC
       +0x19c SuspendSemaphore : _KSEMAPHORE
       +0x1b0 ThreadListEntry  : _LIST_ENTRY
       +0x1b8 FreezeCount      : Char
       +0x1b9 SuspendCount     : Char
       +0x1ba IdealProcessor   : UChar
       +0x1bb DisableBoost     : UChar
    

    五、逆向分析KiSystemService,需要用到上面的结构体

    六、总结

    原来的寄存器存储到_Trap_Frame结构体里,3环API参数指针通过EDX传给0环。
  • 相关阅读:
    进程和程序的关系
    进程和线程区别和联系
    什么是进程,进程的特征
    23.each和map函数
    22.仿淘宝五角星评论(链式编程、隐式迭代)
    19.阻止事件冒泡e.stopPropagation();
    18.阻止默认操作e.preventDefault();防止冒泡事件:e.stopPropagation()
    15.仿腾讯固定导航栏
    14.仿京东右侧边导航栏
    算法学习:树上差分
  • 原文地址:https://www.cnblogs.com/Besttwuya/p/14087319.html
Copyright © 2011-2022 走看看