Conversation

Ever wanted to make your sketchy sys calls look squeaky clean? I wrote a blog demonstrating a PoC which calls NtOpenProcess to grab a handle to lsass with an arbitrary/spoofed call stack: labs.withsecure.com/blog/spoofing- PoC: github.com/countercept/Ca
10
625
neat trick using nonvol reg. I think it might be easy to detect by looking for obvious jump gadget or more generically looking for missing call instruction before ret address
1
1
You can scan for gadgets with a call before or to do the unwinding vs real control flow desynch with something other than a jmp. The best way to detect this is simply comparing with shadow stack. Needs a few years though until CET is the standard, too many legacy CPUs for now.
3