Skip to content

noloader/PEVAT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PEVAT

The Process Event Vulnerability Assessment Tool (PEVAT) can be used to analyze and disrupt IPC and synchronization between userland programs and privileged components like drivers and the kernel. The tool was created by Jeffrey Walton and Brooke Stephens.

PEVAT was developed for testing Windows Antivirus software. The tests involved manipulating shared Windows events, like an event that could be set by the UI task bar widget (unprivileged) to signal the AV scanner (privileged component) to pause or shutdown.

PEVAT suscessfully attacked 22 or 23 Windows antivirus suites. The tool can attack named and unnamed events. The tool also has an automated testing mode to test all events in a process. An example of the UI can be seen in the paper (discussed next).

A paper is available called "Old Dogs and New Tricks - Do You Know Where Your Handles Are?" The paper is included with the source code. The paper shows how PEVAT and PMVAT were used to silently shutdown Microsoft Security Essentials, and block a UI window informing the user of the shutdown.

A file called ProtectProcess.rar is available. The sample code in ProtectProcess shows you how to secure your process's DACL to help avoid the manipulations. The code mimics a Windows Protected Process, which was introduced for Digital Rights Management (DRM) and protecting rich content. However, the code can only protect against unprivileged users; administrators can always gain access in a discretionary access control systems like Windows.