Skip to content

LloydLabs/process-enumeration-stealth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🚴 process-enumeration-stealth

What is this?

This is a simple PoC which allows you to return a list of PIDs currently using NTFS, by querying the \ntfs\ base device (the Windows filesystem base object). Using this method circumvents the need to use typical APIs, such as NtQuerySystemInformation or the higher level EnumProcesses. Using this non-typical reconnaissance method could allow operators to evade typical monitoring on endpoints 🎉. Thank you to Jonas Lyk for originally finding this trick.

How does this work?

  1. Get a handle to \ntfs\ with GENERIC_READ | SYNCHRONIZE
  2. Query the information with the FileProcessIdsUsingFileInformation class using the NtQueryInformationFile API
  3. Walk over a PFILE_PROCESS_IDS_USING_FILE_INFORMATION list of process IDs

Other

If you wish to contact me quicker, feel free to on Twitter or e-mail.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages