xM0kht4r/AV-EDR-Killer: AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
github.com·6h·
Discuss: r/opensource
🔐Hardware Security
Preview
Report Post

AV/EDR Killer

BYOVD.PoC.mp4

This project demonstartes how a legit, and signed driver can be weponized to gain kernel level access.

🚨 The vulnerable driver:

wsftprm.sys , signed by TPZ SOLUCOES DIGITAIS LTDA, and previously exposed to a local privilege escalation vulnerabliy publicly disclosed as CVE-2023-52271, but somehow still NOT on Microsoft’s driver blocklist!! 🤫🤫

The vulnerability is triggered via IOCTL code 0x22201C with a 1036-byte buffer where the first 4 bytes contain the target Process ID as a DWORD. The vulnerable driver, upon receiving this malicious IOCTL through DeviceIoControl, it invokes the imported ZwTerminateProcess function, granting any user-mode application kernel-level process termination capabilities.

Any sane threat actor will naturally prio…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help