kernel mode anti cheat
Find a file
2023-11-02 03:38:37 +11:00
driver win11 bug fux 2023-11-02 03:38:37 +11:00
server c: 2023-10-04 03:03:55 +11:00
service some stuffffffff 2023-09-24 21:13:20 +10:00
testcli update tutorial readme 2023-11-01 20:48:14 +11:00
testdrv update tutorial readme 2023-11-01 20:48:14 +11:00
user bug fix 2023-11-02 02:21:13 +11:00
.gitattributes Add .gitattributes, .gitignore, and README.md. 2023-08-15 22:02:15 +10:00
.gitignore Add .gitattributes, .gitignore, and README.md. 2023-08-15 22:02:15 +10:00
ac.sln DIE 2023-11-01 03:22:04 +11:00
dblayout.drawio e 2023-09-08 03:49:36 +10:00
README.md bug fix 2023-11-02 02:21:13 +11:00

ac

features

  • Attached thread detection
  • Process module .text section integrity checks
  • NMI and APC stackwalking
  • IPI stackwalking which is a relatively unknown method compared to NMIs and APCs
  • Handle stripping via obj callbacks
  • Process handle table enumeration
  • System module verification
  • System module .text integrity checks (see known issues)
  • Unlinked process detection
  • Hidden thread detection via KPRCB
  • Hidden thread detection via PspCid table
  • Dispatch routine validation
  • Extraction of hardware identifiers
  • EPT hook detection (currently detects hyperdbg and DdiMon)
  • Driver integrity checks both locally and over server
  • Test signing detection
  • Hypervisor detection

planned features

  • Heartbeat between components
  • ntoskrnl integrity checks (currently in progress)
  • some way of identifying spoofed stacks
  • some way of dynamically resolving offsets. Will probably use a pdb parser but i am working on a debuglib atm using the windows debug api. We will see.
  • some form of cr3 protection
  • some more detection methods other then stackwalking xD
  • various forms of encryption and other things

known issues

  • the system module validation (NOT the driver integrity check) success rate varies. On some versions it works flawlessy, other times 60% or so of modules will fail, stating that the module regions are not equivalent.
  • process modules integrity checks sometimes crash the user mode app on windows 11.

Ive thoroughly tested the driver with verifier in addition to extended testing on my main pc (non vm) so at the least there shouldn't be any bluescreens (hopefully...). If you do find any, feel free to open an issue with the minidump :)

windows versions tested:

  • Win10 22H2
  • Win11 22H2

how 2 use

  1. Build the project in visual studio, if you experience any build issues - check the drivers project settings are the following:
    • Inf2Cat -> General -> Use Local Time to Yes
    • C/C++ -> Treat Warnings As Errors to No
    • C/C++ -> Spectre Mitigation to Disabled
  2. Move the driver.sys file into Windows/System32/Drivers directory
  3. Use the osr loader to load the driver at "system" load.
    • Osr loader can be found here: https://www.osronline.com/article.cfm%5Earticle=157.htm
    • driver must be named "driver.sys" (sorry.. will be fixed soon (i am lazy))
    • IMPORTANT: its important that you only click "Register" in the OSR loader, dont actually load the driver only register it. Then restart. This is very important as the driver needs an accurate representation of system threads and processes in order for many of the detection methods to work.
  4. inject dll into program you want to protect, i used notepad for testing.
    • IMPORTANT: it is important that this process is started as administrator, which in turn means the injector you use must also be started as administrator. This is a design flaw. Will be fixed in the future.
    • Obviously in a "real" program, the dll would be embedded into the application - for now this is what we work with.
  5. Logs can be seen both in the terminal and either dbgview or WinDbg depending on what you use.
  6. The server and service arent needed, youll just see a bunch of "failed to write to pipe" if you dont launch the service, this is fine and the core anti cheat + user mode is still working.

contact

feel free to dm me on discord or uc @donnaskiez