Where can I get these 2 files :
"rtls\prtl.h"
"ntdll\winnative.h"
"rtls\prtl.h"
"ntdll\winnative.h"
A forum for reverse engineering, OS internals and malware analysis
alaf1234567890 wrote:Where can I get these 2 files :Nowhere. It is our C runtime reimplementation and native API based support routines you have to implement yourself.
"rtls\prtl.h"
"ntdll\winnative.h"
TurlaBoy wrote:Hey EP_X0FF,I agree with you. The thing of driver signing and certificates is more about business than security. AFAIK nothing really forces you to revoke your code signing certificate when a vulnerability in your driver is found, allowing to bypass DSE etc. is found. Hence, the DSE filters out only people that are developing open source software and do not want to pay and those who cannot pass the verification process (if you have a valid passport, you won't have any problem).
Nice work, I just wonder if MS (smoked)employees really thought someday driver signature checking would help against RKs since the begginning, you guys just need to realize you can't give users protection against undocumented stuff, and unknown attack techniques, PG is useless against thousands of attacks, and now again, a lot of malware crap are going to use this, and you guys are gonna try to protect DSE var with another USELESS stuff, and who is losing with this useless cycle?
OpenSouce projects, people who want to learn, to develop, and the cycle restarts, the snake eats it's tail