Skip to content

Latest commit

 

History

History
27 lines (16 loc) · 1.68 KB

README.md

File metadata and controls

27 lines (16 loc) · 1.68 KB

SandboxBootkit

Bootkit tested on Windows Sandbox to patch ntoskrnl.exe and disable DSE/PatchGuard. There is a blog post going into more detail about the implementation.

Getting started

  • Download the latest release and extract the archive
  • Run Installer.exe
  • Start Windows Sandbox

Note: (parts of) the release might be detected as a virus by Windows Defender. This is a false positive, so you might need to add an exclusion.

Troubleshooting

If you run into issues getting things to work on Windows Sandbox make sure you try with development mode enabled (CmDiag DevelopmentMode -On). On Windows 11 there have been reports of the changes not being applied to the sandbox without it.

Standalone bootkit

You can run SandbotBootkit.efi on real hardware or a VM too (although you might as well use EfiGuard in that case). To do so you attach a new (virtual) disk (formatted as FAT32) and copy SandboxBootkit.efi to \EFI\Boot\bootx64.efi. Then change the boot order to boot from your new disk first. The relevant functionality is implemented in the LoadBootManager function.

Development

  • Clone the project (with submodules)
  • Use SandboxBootkit.sln to build the project
  • Look at the Installer project on how to install the bootkit

Note: During development it's easiest to enable development mode. Without it you won't be able to write to the BaseLayer.