PowerSploit/RE_Tools/Get-KernelModuleInfo.ps1

200 lines
8.6 KiB
PowerShell

function Get-KernelModuleInfo
{
<#
.SYNOPSIS
Returns loaded kernel module information.
PowerSploit Module - Get-KernelModuleInfo
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
.DESCRIPTION
Get-KernelModuleInfo wraps NtQuerySystemInformation and returns loaded kernel module information. Get-KernelModuleInfo works on both x86 and x86_64 platforms.
.EXAMPLE
C:\PS> Get-KernelModuleInfo
ImageBaseAddress ImageSize Flags Id Rank W018 NameOffset Name
---------------- --------- ----- -- ---- ---- ---------- ----
0xFFFFF800FF200000 0x00749000 0x08804000 0x0000 0x0000 0x0083 0x0015 C:\Windows\system32\ntoskrnl.exe
0xFFFFF800FF949000 0x0006C000 0x08804000 0x0001 0x0000 0x0027 0x0015 C:\Windows\system32\hal.dll
0xFFFFF88000C93000 0x0005F000 0x09104000 0x0003 0x0000 0x0001 0x0015 C:\Windows\system32\mcupdate_GenuineIntel.dll
0xFFFFF88000D71000 0x00015000 0x0D104000 0x0006 0x0000 0x0003 0x0015 C:\Windows\system32\PSHED.dll
0xFFFFF8800101A000 0x000C2000 0x09104000 0x000A 0x0000 0x0001 0x001D C:\Windows\system32\drivers\Wdf01000.sys
0xFFFFF8800117B000 0x0000A000 0x0D104000 0x000F 0x0000 0x0011 0x001D C:\Windows\System32\drivers\WMILIB.SYS
0xFFFFF88000F5C000 0x00017000 0x09104000 0x0015 0x0000 0x0001 0x001D C:\Windows\system32\drivers\pdc.sys
0xFFFFF880011CC000 0x0001A000 0x09104000 0x001C 0x0000 0x0001 0x001D C:\Windows\System32\drivers\mountmgr.sys
0xFFFFF88001600000 0x0001B000 0x09104000 0x0024 0x0000 0x0015 0x001D C:\Windows\System32\Drivers\ksecdd.sys
0xFFFFF88001C00000 0x00076000 0x09104000 0x002D 0x0000 0x0001 0x001D C:\Windows\System32\DRIVERS\fvevol.sys
0xFFFFF88003CCD000 0x0000E000 0x4D104000 0x0042 0x0000 0x0007 0x001D C:\Windows\system32\DRIVERS\TDI.SYS
0xFFFFF88004200000 0x0001E000 0x49104000 0x005B 0x0000 0x0001 0x001D C:\Windows\system32\DRIVERS\rassstp.sys
0xFFFFF88005400000 0x0007B000 0x4D104000 0x0069 0x0000 0x0001 0x001D C:\Windows\System32\drivers\USBPORT.SYS
0xFFFFF88006598000 0x0000A000 0x49104000 0x0078 0x0000 0x0001 0x001D C:\Windows\System32\drivers\wmiacpi.sys
0xFFFFF880069EB000 0x0000D000 0x49104000 0x0088 0x0000 0x0002 0x001D C:\Windows\System32\Drivers\dump_diskdump.sys
0xFFFFF88019542000 0x0004B000 0x49104000 0x0099 0x0000 0x0001 0x001D C:\Windows\system32\DRIVERS\mrxsmb10.sys
0xFFFFF880194C7000 0x0000B000 0x49104000 0x00AB 0x0000 0x0001 0x001D C:\Windows\System32\drivers\WpdUpFltr.sys
.NOTES
To display the output as seen in the example, ensure that Get-KernelModuleInfo.format.ps1xml resides in the same directory as Get-KernelModuleInfo.ps1.
.LINK
http://www.exploit-monday.com/
#>
# Load custom object formatting views
$FormatPath = Join-Path $PSScriptRoot Get-KernelModuleInfo.format.ps1xml
# Don't load format ps1xml if it doesn't live in the same folder as this script
if (Test-Path $FormatPath)
{
Update-FormatData -PrependPath (Join-Path $PSScriptRoot Get-KernelModuleInfo.format.ps1xml)
}
$PinvokeCode = @"
using System;
using System.Runtime.InteropServices;
public class Ntdll
{
[Flags]
public enum _SYSTEM_INFORMATION_CLASS : uint
{
SystemModuleInformation = 11,
SystemHandleInformation = 16
}
[StructLayout(LayoutKind.Sequential, Pack=1)]
public struct _SYSTEM_MODULE32
{
public ushort Reserved1;
public ushort Reserved2;
public uint ImageBaseAddress;
public uint ImageSize;
public uint Flags;
public ushort Id;
public ushort Rank;
public ushort w018;
public ushort NameOffset;
[MarshalAsAttribute(UnmanagedType.ByValArray, SizeConst=256)]
public byte[] Name;
}
[StructLayout(LayoutKind.Sequential, Pack=1)]
public struct _SYSTEM_MODULE64
{
public uint Reserved1;
public uint Reserved2;
public ulong ImageBaseAddress;
public uint ImageSize;
public uint Flags;
public ushort Id;
public ushort Rank;
public ushort w018;
public ushort NameOffset;
[MarshalAsAttribute(UnmanagedType.ByValArray, SizeConst=256)]
public byte[] Name;
}
[StructLayout(LayoutKind.Sequential, Pack=1)]
public struct _SYSTEM_MODULE_INFORMATION
{
public uint ModulesCount;
}
[DllImport("ntdll.dll", CharSet=CharSet.Auto, SetLastError=true)]
public static extern uint NtQuerySystemInformation(uint InfoType, IntPtr lpStructure, uint StructSize, ref uint returnLength);
}
"@
# Returns a string from a byte array
function Local:Get-String([Byte[]] $Bytes)
{
$Char = $Bytes[0]
$StringArray = New-Object Byte[](0)
for ($i = 0; $Char -ne 0; $i++)
{
$StringArray += $Char; $Char = $Bytes[$i]
}
Write-Output (($StringArray | % {[Char] $_}) -join '')
}
$CompilerParams = New-Object System.CodeDom.Compiler.CompilerParameters
$CompilerParams.ReferencedAssemblies.AddRange(@("System.dll", [PsObject].Assembly.Location))
$CompilerParams.GenerateInMemory = $True
try { Add-Type -TypeDefinition $PinvokeCode -CompilerParameters $CompilerParams -PassThru | Out-Null } catch {}
# $TotalLength represents the total size of the returned structures. This will be used to allocate sufficient memory to store each returned structure.
$TotalLength = 0
# Call NtQuerySystemInformation first to get the total size of the structures to be returned.
[Ntdll]::NtQuerySystemInformation([Ntdll+_SYSTEM_INFORMATION_CLASS]::SystemModuleInformation, [IntPtr]::Zero, 0, [Ref] $TotalLength) | Out-Null
$PtrSystemInformation = [Runtime.InteropServices.Marshal]::AllocHGlobal($TotalLength)
$Result = [Ntdll]::NtQuerySystemInformation([Ntdll+_SYSTEM_INFORMATION_CLASS]::SystemModuleInformation, $PtrSystemInformation, $TotalLength, [Ref] 0)
if ($Result -ne 0)
{
Throw "An error occured. (NTSTATUS: 0x$($Result.ToString('X8')))"
}
if ([IntPtr]::Size -eq 8)
{
$SystemModuleType = [Ntdll+_SYSTEM_MODULE64]
$StructSize = 296
$PtrModule = [IntPtr]($PtrSystemInformation.ToInt64() + 16)
}
else
{
$SystemModuleType = [Ntdll+_SYSTEM_MODULE32]
$StructSize = 284
$PtrModule = [IntPtr]($PtrSystemInformation.ToInt64() + 8)
}
$i = 0
$AnotherModule = $True
# Loop through all the returned _SYSTEM_MODULE structs
while ($AnotherModule) {
# Move pointer to the next structure
$PtrModule = [IntPtr] ($PtrModule.ToInt64() + ($i * $StructSize))
# Cast the next struct in memory to type _SYSTEM_MODULE[32|64]
$SystemModule = [Runtime.InteropServices.Marshal]::PtrToStructure($PtrModule, [Type] $SystemModuleType)
if ($SystemModule.Name[0] -ne 0)
{
$ModuleInfo = @{
ImageBaseAddress = $SystemModule.ImageBaseAddress
ImageSize = $SystemModule.ImageSize
Flags = $SystemModule.Flags
Id = $SystemModule.Id
Rank = $SystemModule.Rank
w018 = $SystemModule.w018
NameOffset = $SystemModule.NameOffset
# Get the full path to the driver and expand SystemRoot in the path
Name = (Get-String $SystemModule.Name) -replace '\\\\SystemRoot', $Env:SystemRoot
}
$Module = New-Object PSObject -Property $ModuleInfo
$Module.PSObject.TypeNames[0] = 'SystemInformation.SYSTEM_MODULE'
Write-Output $Module
}
else
{
# No more modules to iterate through
$AnotherModule = $False
}
$i++
}
# Free the unmanaged memory used to store the structures
[Runtime.InteropServices.Marshal]::FreeHGlobal($PtrSystemInformation)
}