• 驱动开发:内核枚举Registry注册表回调


    在笔者上一篇文章《驱动开发:内核枚举LoadImage映像回调》LyShark教大家实现了枚举系统回调中的LoadImage通知消息,本章将实现对Registry注册表通知消息的枚举,与LoadImage消息不同Registry消息不需要解密只要找到CallbackListHead消息回调链表头并解析为_CM_NOTIFY_ENTRY结构即可实现枚举。

    我们来看一款闭源ARK工具是如何实现的:

    注册表系统回调的枚举需要通过特征码搜索来实现,首先我们可以定位到uf CmUnRegisterCallback内核函数上,在该内核函数下方存在一个CallbackListHead链表节点,取出这个链表地址。

    当得到注册表链表入口0xfffff8063a065bc0直接将其解析为_CM_NOTIFY_ENTRY即可得到数据,如果要遍历下一个链表则只需要ListEntryHead.Flink向下移动指针即可。

    // 署名权
    // right to sign one's name on a piece of work
    // PowerBy: LyShark
    // Email: me@lyshark.com
    
    // 注册表回调函数结构体定义
    typedef struct _CM_NOTIFY_ENTRY
    {
      LIST_ENTRY  ListEntryHead;
      ULONG   UnKnown1;
      ULONG   UnKnown2;
      LARGE_INTEGER Cookie;
      PVOID   Context;
      PVOID   Function;
    }CM_NOTIFY_ENTRY, *PCM_NOTIFY_ENTRY;
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15

    要想得到此处的链表地址,需要先通过MmGetSystemRoutineAddress()获取到CmUnRegisterCallback函数基址,然后在该函数起始位置向下搜索,找到这个链表节点,并将其后面的基地址取出来,在上一篇《驱动开发:内核枚举LoadImage映像回调》文章中已经介绍了定位方式此处跳过介绍,具体实现代码如下。

    // 署名权
    // right to sign one's name on a piece of work
    // PowerBy: LyShark
    // Email: me@lyshark.com
    
    #include 
    #include 
    
    // 指定内存区域的特征码扫描
    // PowerBy: LyShark.com
    PVOID SearchMemory(PVOID pStartAddress, PVOID pEndAddress, PUCHAR pMemoryData, ULONG ulMemoryDataSize)
    {
    	PVOID pAddress = NULL;
    	PUCHAR i = NULL;
    	ULONG m = 0;
    
    	// 扫描内存
    	for (i = (PUCHAR)pStartAddress; i < (PUCHAR)pEndAddress; i++)
    	{
    		// 判断特征码
    		for (m = 0; m < ulMemoryDataSize; m++)
    		{
    			if (*(PUCHAR)(i + m) != pMemoryData[m])
    			{
    				break;
    			}
    		}
    		// 判断是否找到符合特征码的地址
    		if (m >= ulMemoryDataSize)
    		{
    			// 找到特征码位置, 获取紧接着特征码的下一地址
    			pAddress = (PVOID)(i + ulMemoryDataSize);
    			break;
    		}
    	}
    
    	return pAddress;
    }
    
    // 根据特征码获取 CallbackListHead 链表地址
    // PowerBy: LyShark.com
    PVOID SearchCallbackListHead(PUCHAR pSpecialData, ULONG ulSpecialDataSize, LONG lSpecialOffset)
    {
    	UNICODE_STRING ustrFuncName;
    	PVOID pAddress = NULL;
    	LONG lOffset = 0;
    	PVOID pCmUnRegisterCallback = NULL;
    	PVOID pCallbackListHead = NULL;
    
    	// 先获取 CmUnRegisterCallback 函数地址
    	RtlInitUnicodeString(&ustrFuncName, L"CmUnRegisterCallback");
    	pCmUnRegisterCallback = MmGetSystemRoutineAddress(&ustrFuncName);
    	if (NULL == pCmUnRegisterCallback)
    	{
    		return pCallbackListHead;
    	}
    
    	// 查找 fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	/*
    	lyshark.com>
    		nt!CmUnRegisterCallback+0x6b:
    		fffff806`3a4271ab 4533c0          xor     r8d,r8d
    		fffff806`3a4271ae 488d542438      lea     rdx,[rsp+38h]
    		fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    		fffff806`3a4271ba e855e2e2ff      call    nt!CmListGetNextElement (fffff806`3a255414)
    		fffff806`3a4271bf 488bf8          mov     rdi,rax
    		fffff806`3a4271c2 4889442440      mov     qword ptr [rsp+40h],rax
    		fffff806`3a4271c7 4885c0          test    rax,rax
    		fffff806`3a4271ca 0f84c7000000    je      nt!CmUnRegisterCallback+0x157 (fffff806`3a427297)  Branch
    	*/
    	pAddress = SearchMemory(pCmUnRegisterCallback, (PVOID)((PUCHAR)pCmUnRegisterCallback + 0xFF), pSpecialData, ulSpecialDataSize);
    	if (NULL == pAddress)
    	{
    		return pCallbackListHead;
    	}
    
    	// 先获取偏移再计算地址
    	lOffset = *(PLONG)((PUCHAR)pAddress + lSpecialOffset);
    	pCallbackListHead = (PVOID)((PUCHAR)pAddress + lSpecialOffset + sizeof(LONG) + lOffset);
    
    	return pCallbackListHead;
    }
    
    
    VOID UnDriver(PDRIVER_OBJECT Driver)
    {
    }
    
    NTSTATUS DriverEntry(IN PDRIVER_OBJECT Driver, PUNICODE_STRING RegistryPath)
    {
    	PVOID pCallbackListHeadAddress = NULL;
    	RTL_OSVERSIONINFOW osInfo = { 0 };
    	UCHAR pSpecialData[50] = { 0 };
    	ULONG ulSpecialDataSize = 0;
    	LONG lSpecialOffset = 0;
    
    	DbgPrint("hello lyshark.com \n");
    
    	// 查找 fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	/*
    	lyshark.com>
    	nt!CmUnRegisterCallback+0x6b:
    	fffff806`3a4271ab 4533c0          xor     r8d,r8d
    	fffff806`3a4271ae 488d542438      lea     rdx,[rsp+38h]
    	fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	fffff806`3a4271ba e855e2e2ff      call    nt!CmListGetNextElement (fffff806`3a255414)
    	fffff806`3a4271bf 488bf8          mov     rdi,rax
    	fffff806`3a4271c2 4889442440      mov     qword ptr [rsp+40h],rax
    	fffff806`3a4271c7 4885c0          test    rax,rax
    	fffff806`3a4271ca 0f84c7000000    je      nt!CmUnRegisterCallback+0x157 (fffff806`3a427297)  Branch
    	*/
    	pSpecialData[0] = 0x48;
    	pSpecialData[1] = 0x8D;
    	pSpecialData[2] = 0x0D;
    	ulSpecialDataSize = 3;
    
    	// 根据特征码获取地址
    	pCallbackListHeadAddress = SearchCallbackListHead(pSpecialData, ulSpecialDataSize, lSpecialOffset);
    
    	DbgPrint("[LyShark.com] CallbackListHead => %p \n", pCallbackListHeadAddress);
    
    	Driver->DriverUnload = UnDriver;
    	return STATUS_SUCCESS;
    }
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • 32
    • 33
    • 34
    • 35
    • 36
    • 37
    • 38
    • 39
    • 40
    • 41
    • 42
    • 43
    • 44
    • 45
    • 46
    • 47
    • 48
    • 49
    • 50
    • 51
    • 52
    • 53
    • 54
    • 55
    • 56
    • 57
    • 58
    • 59
    • 60
    • 61
    • 62
    • 63
    • 64
    • 65
    • 66
    • 67
    • 68
    • 69
    • 70
    • 71
    • 72
    • 73
    • 74
    • 75
    • 76
    • 77
    • 78
    • 79
    • 80
    • 81
    • 82
    • 83
    • 84
    • 85
    • 86
    • 87
    • 88
    • 89
    • 90
    • 91
    • 92
    • 93
    • 94
    • 95
    • 96
    • 97
    • 98
    • 99
    • 100
    • 101
    • 102
    • 103
    • 104
    • 105
    • 106
    • 107
    • 108
    • 109
    • 110
    • 111
    • 112
    • 113
    • 114
    • 115
    • 116
    • 117
    • 118
    • 119
    • 120
    • 121
    • 122
    • 123
    • 124

    运行这段代码,并可得到注册表回调入口地址,输出效果如下所示:

    得到了注册表回调入口地址,接着直接循环遍历输出这个链表即可得到所有的注册表回调。

    // 署名权
    // right to sign one's name on a piece of work
    // PowerBy: LyShark
    // Email: me@lyshark.com
    
    #include 
    #include 
    
    // 指定内存区域的特征码扫描
    // PowerBy: LyShark.com
    PVOID SearchMemory(PVOID pStartAddress, PVOID pEndAddress, PUCHAR pMemoryData, ULONG ulMemoryDataSize)
    {
    	PVOID pAddress = NULL;
    	PUCHAR i = NULL;
    	ULONG m = 0;
    
    	// 扫描内存
    	for (i = (PUCHAR)pStartAddress; i < (PUCHAR)pEndAddress; i++)
    	{
    		// 判断特征码
    		for (m = 0; m < ulMemoryDataSize; m++)
    		{
    			if (*(PUCHAR)(i + m) != pMemoryData[m])
    			{
    				break;
    			}
    		}
    		// 判断是否找到符合特征码的地址
    		if (m >= ulMemoryDataSize)
    		{
    			// 找到特征码位置, 获取紧接着特征码的下一地址
    			pAddress = (PVOID)(i + ulMemoryDataSize);
    			break;
    		}
    	}
    
    	return pAddress;
    }
    
    // 根据特征码获取 CallbackListHead 链表地址
    // PowerBy: LyShark.com
    PVOID SearchCallbackListHead(PUCHAR pSpecialData, ULONG ulSpecialDataSize, LONG lSpecialOffset)
    {
    	UNICODE_STRING ustrFuncName;
    	PVOID pAddress = NULL;
    	LONG lOffset = 0;
    	PVOID pCmUnRegisterCallback = NULL;
    	PVOID pCallbackListHead = NULL;
    
    	// 先获取 CmUnRegisterCallback 函数地址
    	RtlInitUnicodeString(&ustrFuncName, L"CmUnRegisterCallback");
    	pCmUnRegisterCallback = MmGetSystemRoutineAddress(&ustrFuncName);
    	if (NULL == pCmUnRegisterCallback)
    	{
    		return pCallbackListHead;
    	}
    
    	// 查找 fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	/*
    	lyshark.com>
    		nt!CmUnRegisterCallback+0x6b:
    		fffff806`3a4271ab 4533c0          xor     r8d,r8d
    		fffff806`3a4271ae 488d542438      lea     rdx,[rsp+38h]
    		fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    		fffff806`3a4271ba e855e2e2ff      call    nt!CmListGetNextElement (fffff806`3a255414)
    		fffff806`3a4271bf 488bf8          mov     rdi,rax
    		fffff806`3a4271c2 4889442440      mov     qword ptr [rsp+40h],rax
    		fffff806`3a4271c7 4885c0          test    rax,rax
    		fffff806`3a4271ca 0f84c7000000    je      nt!CmUnRegisterCallback+0x157 (fffff806`3a427297)  Branch
    	*/
    	pAddress = SearchMemory(pCmUnRegisterCallback, (PVOID)((PUCHAR)pCmUnRegisterCallback + 0xFF), pSpecialData, ulSpecialDataSize);
    	if (NULL == pAddress)
    	{
    		return pCallbackListHead;
    	}
    
    	// 先获取偏移再计算地址
    	lOffset = *(PLONG)((PUCHAR)pAddress + lSpecialOffset);
    	pCallbackListHead = (PVOID)((PUCHAR)pAddress + lSpecialOffset + sizeof(LONG) + lOffset);
    
    	return pCallbackListHead;
    }
    
    // 注册表回调函数结构体定义
    typedef struct _CM_NOTIFY_ENTRY
    {
    	LIST_ENTRY  ListEntryHead;
    	ULONG   UnKnown1;
    	ULONG   UnKnown2;
    	LARGE_INTEGER Cookie;
    	PVOID   Context;
    	PVOID   Function;
    }CM_NOTIFY_ENTRY, *PCM_NOTIFY_ENTRY;
    
    VOID UnDriver(PDRIVER_OBJECT Driver)
    {
    }
    
    NTSTATUS DriverEntry(IN PDRIVER_OBJECT Driver, PUNICODE_STRING RegistryPath)
    {
    	PVOID pCallbackListHeadAddress = NULL;
    	RTL_OSVERSIONINFOW osInfo = { 0 };
    	UCHAR pSpecialData[50] = { 0 };
    	ULONG ulSpecialDataSize = 0;
    	LONG lSpecialOffset = 0;
    
    	DbgPrint("hello lyshark.com \n");
    
    	// 查找 fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	/*
    	lyshark.com>
    	nt!CmUnRegisterCallback+0x6b:
    	fffff806`3a4271ab 4533c0          xor     r8d,r8d
    	fffff806`3a4271ae 488d542438      lea     rdx,[rsp+38h]
    	fffff806`3a4271b3 488d0d06eac3ff  lea     rcx,[nt!CallbackListHead (fffff806`3a065bc0)]
    	fffff806`3a4271ba e855e2e2ff      call    nt!CmListGetNextElement (fffff806`3a255414)
    	fffff806`3a4271bf 488bf8          mov     rdi,rax
    	fffff806`3a4271c2 4889442440      mov     qword ptr [rsp+40h],rax
    	fffff806`3a4271c7 4885c0          test    rax,rax
    	fffff806`3a4271ca 0f84c7000000    je      nt!CmUnRegisterCallback+0x157 (fffff806`3a427297)  Branch
    	*/
    	pSpecialData[0] = 0x48;
    	pSpecialData[1] = 0x8D;
    	pSpecialData[2] = 0x0D;
    	ulSpecialDataSize = 3;
    
    	// 根据特征码获取地址
    	pCallbackListHeadAddress = SearchCallbackListHead(pSpecialData, ulSpecialDataSize, lSpecialOffset);
    
    	DbgPrint("[LyShark.com] CallbackListHead => %p \n", pCallbackListHeadAddress);
    
    	// 遍历链表结构
    	ULONG i = 0;
    	PCM_NOTIFY_ENTRY pNotifyEntry = NULL;
    
    	if (NULL == pCallbackListHeadAddress)
    	{
    		return FALSE;
    	}
    
    	// 开始遍历双向链表
    	pNotifyEntry = (PCM_NOTIFY_ENTRY)pCallbackListHeadAddress;
    	do
    	{
    		// 判断pNotifyEntry地址是否有效
    		if (FALSE == MmIsAddressValid(pNotifyEntry))
    		{
    			break;
    		}
    		// 判断回调函数地址是否有效
    		if (MmIsAddressValid(pNotifyEntry->Function))
    		{
    			DbgPrint("[LyShark.com] 回调函数地址: 0x%p | 回调函数Cookie: 0x%I64X \n", pNotifyEntry->Function, pNotifyEntry->Cookie.QuadPart);
    		}
    
    		// 获取下一链表
    		pNotifyEntry = (PCM_NOTIFY_ENTRY)pNotifyEntry->ListEntryHead.Flink;
    
    	} while (pCallbackListHeadAddress != (PVOID)pNotifyEntry);
    
    	Driver->DriverUnload = UnDriver;
    	return STATUS_SUCCESS;
    }
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • 32
    • 33
    • 34
    • 35
    • 36
    • 37
    • 38
    • 39
    • 40
    • 41
    • 42
    • 43
    • 44
    • 45
    • 46
    • 47
    • 48
    • 49
    • 50
    • 51
    • 52
    • 53
    • 54
    • 55
    • 56
    • 57
    • 58
    • 59
    • 60
    • 61
    • 62
    • 63
    • 64
    • 65
    • 66
    • 67
    • 68
    • 69
    • 70
    • 71
    • 72
    • 73
    • 74
    • 75
    • 76
    • 77
    • 78
    • 79
    • 80
    • 81
    • 82
    • 83
    • 84
    • 85
    • 86
    • 87
    • 88
    • 89
    • 90
    • 91
    • 92
    • 93
    • 94
    • 95
    • 96
    • 97
    • 98
    • 99
    • 100
    • 101
    • 102
    • 103
    • 104
    • 105
    • 106
    • 107
    • 108
    • 109
    • 110
    • 111
    • 112
    • 113
    • 114
    • 115
    • 116
    • 117
    • 118
    • 119
    • 120
    • 121
    • 122
    • 123
    • 124
    • 125
    • 126
    • 127
    • 128
    • 129
    • 130
    • 131
    • 132
    • 133
    • 134
    • 135
    • 136
    • 137
    • 138
    • 139
    • 140
    • 141
    • 142
    • 143
    • 144
    • 145
    • 146
    • 147
    • 148
    • 149
    • 150
    • 151
    • 152
    • 153
    • 154
    • 155
    • 156
    • 157
    • 158
    • 159
    • 160
    • 161
    • 162
    • 163

    最终运行这个驱动程序,输出如下效果:

    目前系统中有两个回调函数,这一点在第一张图片中也可以得到,枚举是正确的。

  • 相关阅读:
    Gin——请求发送和路由总结
    网络编程实战(一)
    乐鑫成为亚马逊 AWS IoT ExpressLink 三家合作伙伴之一
    OA会议 04 (查询&会议签字)
    网络编程TCP/UDP通信
    c# --- 继承
    06乐观锁与悲观锁
    nlp序列完全可以模拟人脑智能
    2020同济大学电子与信息工程学院计算机系夏令营机试题目【含题解、注释】
    Android View的测量、布局、绘制
  • 原文地址:https://blog.csdn.net/lyshark_csdn/article/details/127444069