漏洞分析:HEVD-0x0.環(huán)境搭建[win7x86]

前言
接下來打算花點(diǎn)時(shí)間去初探Ring0漏洞利用的世界,看看內(nèi)核的世界,這里基于實(shí)驗(yàn)環(huán)境HEVD進(jìn)行學(xué)習(xí)實(shí)驗(yàn),主要內(nèi)容是Ring0下的各種類型的漏洞的示例,以及針對各種漏洞的利用方法,基于最新的HEVD3.0進(jìn)行實(shí)驗(yàn),目錄如下:
?????????? 漏洞分析:HEVD-00.環(huán)境搭建[win7x86]
?????????? 漏洞分析:HEVD-01.StackOverflow[win7x86]
?????????? 漏洞分析:HEVD-02.StackOverflowGS[win7x86]
?????????? 漏洞分析:HEVD-03.ArbitraryOverwrite[win7x86]
?????????? 漏洞分析:HEVD-04.PoolOverflow[win7x86]
?????????? 漏洞分析:HEVD-05.NullPointerDereference[win7x86]
?????????? 漏洞分析:HEVD-06.UninitializedStackVariable[win7x86]
?????????? 漏洞分析:HEVD-07.UninitializedHeapVariable[win7x86]
?????????? 漏洞分析:HEVD-08.IntegerOverflow[win7x86]
?????????? 漏洞分析:HEVD-09.UseAfterFree[win7x86]
?????????? 漏洞分析:HEVD-10.TypeConfusing[win7x86]
?????????? 漏洞分析:HEVD-11.DoubleFetch[win7x86]
環(huán)境準(zhǔn)備:
?????????? 虛擬機(jī):Windows 7 sp1 x86
?????????? 物理機(jī):Windows 10 + Windbg Preview + VS2019 + WDK
?????????? 軟件:HEVD3.0(參考資料[2])
配置雙機(jī)調(diào)試
安裝好虛擬機(jī),關(guān)機(jī),設(shè)置虛擬機(jī):
?????????? 移除打印機(jī)
?????????? 添加串行端口,設(shè)置如圖:
????????????

開啟虛擬機(jī),以管理員運(yùn)行cmd,執(zhí)行如下命令啟動調(diào)試模式:
bcdedit /dbgsettings serial baudrate:115200 debugport:1
bcdedit /copy {current} /d DebugEntry
bcdedit /displayorder {current} {ID}
bcdedit /debug {ID} ON
Win7x86可直接加載驅(qū)動服務(wù)安裝啟動(Win7 x64和Win10新增了強(qiáng)制驅(qū)動簽名)
成功后,可重啟用windbg進(jìn)行雙機(jī)調(diào)試了
安裝HEVD驅(qū)動
編譯驅(qū)動:
?????????? 運(yùn)行Build_HEVD_Vulnerable_x86.bat(Windows7 x86)
?????????? 運(yùn)行?Build_HEVD_Vulnerable_x64.bat(Windows10 x64)
安裝驅(qū)動:

windbg配置符號路徑,檢查符號信息:

驗(yàn)證驅(qū)動模塊是否安裝成功,編譯官方exp進(jìn)行提權(quán)測試,已提升至System權(quán)限,環(huán)境搭建成功:

參考資料
?????????? [1]?HEVD3.0環(huán)境搭建 - 食兔人的博客 (ycdxsb.cn)?https://blog.ycdxsb.cn/46ae8303.html
?????????? [2]?hacksysteam/HackSysExtremeVulnerableDriver: HackSys Extreme Vulnerable Windows Driver (github.com)?https://github.com/hacksysteam/HackSysExtremeVulnerableDriver
?????????? [3]?初學(xué)Windows內(nèi)核漏洞利用(二):熟悉HEVD - 簡書 (jianshu.com)?https://www.jianshu.com/p/189f857f37ef