Hi,
I'm trying to understand how a kernel-mode driver talks to it's usermode component.
I attempted to do this by hooking DeviceIOControl on the target usermode process but the usermode process does not actually make that request (it works the other way) but I did find out that it uses the named pipe \NamedPipe\Battleye. Static analysis is not possible.
Additionally, the communication is very time-sensitive so using WinDbg to breakpoint Read/Write is simply not feasible.
How would I go about sniffing this pipe? As I've stated packets are sent to ring3 from ring0 so hooking the API functions doesn't really work.
Thanks.
I'm trying to understand how a kernel-mode driver talks to it's usermode component.
I attempted to do this by hooking DeviceIOControl on the target usermode process but the usermode process does not actually make that request (it works the other way) but I did find out that it uses the named pipe \NamedPipe\Battleye. Static analysis is not possible.
Additionally, the communication is very time-sensitive so using WinDbg to breakpoint Read/Write is simply not feasible.
How would I go about sniffing this pipe? As I've stated packets are sent to ring3 from ring0 so hooking the API functions doesn't really work.
Thanks.