Hunting and Exploiting Vulnerable Windows Drivers
Introduction
What Makes Drivers Dangerous?
Part 1: Finding Vulnerable Drivers on a Windows System
Step 1: Enumerate Installed Drivers
Get-WmiObject Win32_SystemDriver | Select-Object Name, PathName, StartMode, Statedriverquery /V /FO CSV > drivers.csvStep 2: Identify Known Vulnerable Drivers
Part 2: Downgrading to a Vulnerable Driver
Preparation (Lab Only!)
Step-by-Step Downgrade Process
Part 3: Analyzing and Exploiting the Driver
Step 1: Identify IOCTL Codes
Step 2: Write Exploit
Real Exploits Examples
Cleanup
Pro Tips for Red Teamers
Further Reading
Conclusion
REFERENCES
Last updated