Skip to content

Hit-And-Run: Syscall Method for Bypassing EDRs via Vectored Exception Handler and Call Stack Theft.

License

Notifications You must be signed in to change notification settings

hexappp/Hit-And-Run

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HIT-AND-RUN

Hit-And-Run is a proof-of-concept implementation of a syscall technique for evading EDRs systems using a novel combination of call stack theft and vectored exception handling (VEH). This technique executes syscalls with attacker-defined parameters while maintaining a legitimate-looking call stack, effectively evading both inline hooking and call stack analysis mechanisms.

image

Key Features

  • Call Stack Theft: Mimics standard Windows API behavior to create a coherent call stack, avoiding detection.
  • Vectored Exception Handling (VEH): Dynamically handles exceptions to manipulate syscall execution flow.
  • Hardware Breakpoints: Utilized to intercept and redirect execution without modifying code, reducing detection risk.

Limitations

  • The setup phase (e.g., AddVectoredExceptionHandler) and the use of debug registers (e.g., Dr0, Dr7) may trigger EDR alerts.
  • Repeated exceptions and predictable behavior patterns could be flagged by behavior-based detection systems.

Learn More

For detailed implementation steps and technical insights, refer to the blog post: Hit-And-Run: A Novel Syscall Method

About

Hit-And-Run: Syscall Method for Bypassing EDRs via Vectored Exception Handler and Call Stack Theft.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 80.3%
  • C 19.7%