Oh dear god this capcom.sys has an ioctl that disables smep and calls a provided function pointer, and sets SMEP back what even /jBCXO7YtNeĬapcom is seemingly using this driver to allow its user-mode game to poke around the machine at the lowest level and spot any attempts by the player to cheat. Capcom.sys completely blows this away on Windows: an application simply has to pass control codes 0xAA012044 and 0xAA013044 to the IOCTL, and a pointer to some instructions, and the driver will then jump to that block of code with full kernel permissions.
0 Comments
Leave a Reply. |