Miscellaneous : Implementation of some concepts in Security and Exploiting.

Miscellaneous : Implementation of some concepts in Security and Exploiting.

One thing that the two processes (exploit and UTILMAN) have in common,
is the desktop these two programs operate on. It turns out that WIN32K.SYS – the main graphical kernel module on Windows – manages two shared sections (a per-session and a per-desktop one),  mapped in the context of every GUI process (a process becomes graphical after issuing a call to one of the WIN32K system calls). One of these sections contains the characteristics of windows present on the considered desktop, including arrays of data (e.g. unicode windows titles, editbox values and more). Consequently, a malicious application is able to store arbitrary bytes in the memory context of a highly-privileged process in the system, just by manipulating or creating basic windows on the local desktop.

Screen Capture Memory Usage

Screen Capture Memory Usage

main.cpp Script:

Source : https://github.com/Rootkitsmm/miscellaneous