Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/D4stiny/spectre
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
https://github.com/D4stiny/spectre
Last synced: 21 days ago
JSON representation
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
- Host: GitHub
- URL: https://github.com/D4stiny/spectre
- Owner: D4stiny
- License: gpl-3.0
- Created: 2020-03-15T09:47:36.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-08-05T07:33:33.000Z (over 4 years ago)
- Last Synced: 2024-08-05T17:24:37.238Z (4 months ago)
- Language: C++
- Homepage:
- Size: 279 KB
- Stars: 666
- Watchers: 23
- Forks: 139
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - D4stiny/spectre - A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine. (C++)
README
![Spectre Rootkit Logo](https://i.imgur.com/P529RIt.png)
Welcome to the *Spectre Rootkit*, a proof-of-concept Windows kernel-mode rootkit I wrote with the hopes of demystifying the Windows kernel for red team usage. The Spectre Rootkit abuses legitimate communication channels in order to receive commands from a C2. You can read more about how it works [here](https://github.com/D4stiny/spectre/wiki/Hooking-IOCTL-Communication-via-Hooking-File-Objects). This project was the focus of my talk, "Demystifying Modern Windows Rootkits", presented at both [Black Hat USA 2020](https://www.blackhat.com/us-20/briefings/schedule/index.html#demystifying-modern-windows-rootkits-20918) and [DEF CON 28](https://defcon.org/html/defcon-safemode/dc-safemode-speakers.html#Demirkapi).
## Getting Started
Please see the [Getting Started](https://github.com/D4stiny/spectre/wiki/Getting-Started) section of the wiki.## Components
Here are the projects inside the Spectre Rootkit solution.- [spectre-kernel](https://github.com/D4stiny/spectre/tree/master/spectre/spectre-kernel) - The core driver project for the rootkit.
- [spectre-cli](https://github.com/D4stiny/spectre/tree/master/spectre/spectre-cli) - The CLI utility used from the C2 to control an infected machine.
- [spectre-stager](https://github.com/D4stiny/spectre/tree/master/spectre/spectre-stager) - The staging utility used to load the rootkit on a victim machine.
- [spectre-stager-util](https://github.com/D4stiny/spectre/tree/master/spectre/spectre-stager-util) - Takes the built driver file and converts it into a XOR-obfuscated header for use by the spectre-stager.## Motivation
The primary motivation for this project was because of the lack of examples for Windows rootkits. You'll often find examples of red team tooling that lies in *user-mode*, but the amount of *kernel-mode* red team tooling is sparse. This project is meant to act as a point of reference, specifically to show *one-way* of approaching the problem of writing a rootkit. Not only did I want to write a rootkit to assist in the development of future red team tooling, but the secondary purpose of this project was to challenge myself by exploring parts of the kernel that aren't well-documented and researching novel techniques I could apply to the rootkit. You'll find that the code base follows a strict code style and is heavily documented.## Notable Tricks and Techniques
The Spectre Rootkit is made up of several tricks and techniques, here are a few of the noteworthy ones:
- [Hooking IOCTL Communication via Hooking File Objects](https://github.com/D4stiny/spectre/wiki/Hooking-IOCTL-Communication-via-Hooking-File-Objects)
- [Spectre Rootkit Design](https://github.com/D4stiny/spectre/wiki/Spectre-Rootkit-Design)
- [Finding Unexported ZwXx Functions Reliably](https://github.com/D4stiny/spectre/wiki/Finding-unexported-ZwXx-functions-reliably)## Thanks
Some well deserved thanks go to...
1. [Alex Ionescu](https://twitter.com/aionescu) - Long-time mentor and Windows internals expert.
2. [ReactOS Project](https://reactos.org) - An incredible reference about the internals of the Windows kernel.
3. [Nemanja Mulasmajic](https://twitter.com/0xNemi) - Gave the idea for the [NtFunctionResolver](https://github.com/D4stiny/spectre/blob/master/spectre/spectre-kernel/NtFunctionResolver.h) component of the rootkit.## Licensing
Interested in a special license? Contact me at `billdemirkapi (AT) gmail (DOT) com`.