Is it true that one must manually enable the TESTSIGNING and restart the computer if one were trying to install a x64 device driver? How do x64 rootkits bypass this clunky mechanism without using stolen certificates?
Hello,
64-bit versions of Windows requires the drivers to be digitally signed by a certificate generated by a trusted certificate authority (Symantec/VeriSign and GlobalSign). The restriction can be made less strict by enabling the TESTSIGNING option (drivers signed by a self-signed and untrusted certificate are also allowed to enter the kernel), or by putting the system into Debug Mode, or by exploiting a vulnerability in an existing driver that is signed properly.
So, when a malware-writer owns a stolen certificate suitable for driver signing, he/she just signs his/her malicious driver, and distributes it.