mirror-ac/README.md

128 lines
5 KiB
Markdown
Raw Normal View History

2023-10-09 18:27:04 +02:00
# ac
2023-12-23 19:52:55 +01:00
open source anti cheat (lol) which I made for fun.
2023-10-13 18:20:59 +02:00
# features
- Attached thread detection
- Process module .text section integrity checks
2023-10-30 12:57:24 +01:00
- NMI and APC stackwalking
- IPI stackwalking which is a relatively unknown method compared to NMIs and APCs
2023-10-13 18:20:59 +02:00
- Handle stripping via obj callbacks
- Process handle table enumeration
- System module verification
2023-10-30 12:57:24 +01:00
- System module .text integrity checks (see known issues)
- Unlinked process detection
2023-10-13 18:20:59 +02:00
- Hidden thread detection via KPRCB
2023-10-30 12:57:24 +01:00
- Hidden thread detection via PspCid table
2023-10-13 18:20:59 +02:00
- Dispatch routine validation
2023-10-30 12:57:24 +01:00
- Extraction of hardware identifiers
2023-10-13 18:20:59 +02:00
- EPT hook detection (currently detects hyperdbg and DdiMon)
- Driver integrity checks both locally and over server
- Test signing detection
2023-10-30 12:57:24 +01:00
- Hypervisor detection
# planned features
2023-12-23 19:52:55 +01:00
- Heartbeat
- ntoskrnl integrity checks, or atleast a small subset of the kernel encompasing critical functions
- spoofed stack identifier
- process module inline hook detection (this would include checking whether the hook is valid, as many legimate programs hook user mode modules such as discord, nvidia overlay etc.)
- cr3 protection
- string, packet and other encryption
- tpm ek extraction
- tpm spoofer detection
- pcileech firmware detection
- testing program to test the features
2023-10-30 12:57:24 +01:00
# known issues
2023-12-23 19:52:55 +01:00
- [See the issues page](https://github.com/donnaskiez/ac/issues)
- Feel free to open a new issue if you find any bugs
2023-10-13 18:20:59 +02:00
2023-11-01 16:21:13 +01:00
# windows versions tested:
2023-10-09 18:27:04 +02:00
2023-11-01 16:21:13 +01:00
- Win10 22H2
- Win11 22H2
2023-10-12 18:33:39 +02:00
2023-12-23 19:52:55 +01:00
# how to build
2023-11-01 18:42:15 +01:00
2023-12-23 19:52:55 +01:00
Requires [Visual Studio](https://visualstudio.microsoft.com/downloads/) and the [WDK](https://learn.microsoft.com/en-us/windows-hardware/drivers/download-the-wdk) for compilation.
2023-10-12 18:33:39 +02:00
2023-11-01 16:21:13 +01:00
1. Build the project in visual studio, if you experience any build issues - check the drivers project settings are the following:
- `Inf2Cat -> General -> Use Local Time` to `Yes`
- `C/C++ -> Treat Warnings As Errors` to `No`
- `C/C++ -> Spectre Mitigation` to `Disabled`
2023-12-23 19:52:55 +01:00
2. Move the `driver.sys` file located in `ac\x64\Release` into the `Windows\System32\Drivers` directory
3. Use the [OSR Loader](https://www.osronline.com/article.cfm%5Earticle=157.htm) and select `driver.sys` that you moved to the Windows drivers folder. DO NOT REGISTER THE SERVICE YET.
2023-11-01 11:04:12 +01:00
- driver must be named "driver.sys" (sorry.. will be fixed soon (i am lazy))
2023-12-23 19:52:55 +01:00
4. Under `Service Start` select `System`. This is VERY important!
5. Click `Register Service`. *Do NOT click* `Start Service`!
6. Restart Windows.
7. Once restarted, open the program you would like to protect as Administrator.
- Yes I understand this is not realistic
8. Open your dll injector program of choice as administrator (I simply use [Process Hacker](https://processhacker.sourceforge.io/))
9. Inject the dll found in `ac\x64\Release` named `user.dll` into the target program
Logs will be printed to both the terminal output and the kernel debugger. See below for configuring kernel debugger output.
Note: The server is not needed for the program to function properly.
# how to configure kernel debugging output
The kernel driver is setup to log at 4 distinct levels:
```C
#define DPFLTR_ERROR_LEVEL
#define DPFLTR_WARNING_LEVEL
#define DPFLTR_INFO_LEVEL
#define DPFLTR_VERBOSE_LEVEL
```
As the names suggest, `ERROR_LEVEL` is for errors, `WARNING_LEVEL` is for warnings. `INFO_LEVEL` is for general information regarding what requests the driver is processing and `VERBOSE_LEVEL` contains very detailed information for each request.
## creating the registry key
If you are unfamiliar with the kernel debugging mask, you probably need to set one up. If you already have a debugging mask setup, you can skip to `setting the mask` below.
1. Open the Registry Editor
2. Copy and pase `Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager` into the bar at the top and press enter
3. On the left hand side, right click `Session Manager` and select `New -> Key`
4. Name the key `Debug Print Filter`
5. On the left hand side you should now see `Debug Print Filter`, right click and select `New -> DWORD (32 bit) Value`
6. Name the key `DEFAULT`
## setting the mask
1. Within the `Debug Print Filter` registry, double click the key named `DEFAULT`
2. Determine the level(s) of logging you would like to see. For most people interested I would set either `INFO_LEVEL` or `VERBOSE_LEVEL`. Remember that if you set `INFO_LEVEL`, you will see all `INFO_LEVEL`, `WARNING_LEVEL` and `ERROR_LEVEL` logs. Ie you see all logs above and including your set level.
```
ERROR_LEVEL = 0x2
2023-12-25 02:31:13 +01:00
WARNING_LEVEL = 0x8
2023-12-23 19:52:55 +01:00
INFO_LEVEL = 0xf
VERBOSE_LEVEL = 0x1f
```
3. Enter the value for the given logging level (seen above)
4. Click `Ok` and restart Windows.
## filtering debug output
If you choose to use `INFO_LEVEL` or `VERBOSE_LEVEL` there may be many logs from the kernel so we want to filter them out.
### windbg
With WinDbg connected to the target:
1. Pause the target using the `Break` button
2. Use the command: `.ofilter donna-ac*`
### debugview
1. Click `Edit -> Filter/Highlight`
2. Set the `Include` string to `donna-ac*`
2023-10-12 18:33:39 +02:00
2023-11-01 16:21:13 +01:00
# contact
feel free to dm me on discord or uc @donnaskiez