FORUMS
Remove All Ads from XDA

[Release] RT Jailbreak Tool

886 posts
Thanks Meter: 565
 
By netham45, Inactive Recognized Developer on 10th January 2013, 01:01 PM
Thread Closed Email Thread
18th November 2013, 04:38 PM |#451  
Senior Member
Thanks Meter: 43
 
More
Quote:
Originally Posted by Myriachan

My in-progress 8.1 jailbreak hack doesn't require the Windows Kits Policy to be installed, no. It bootstraps execution of unsigned native code using an exploit in PowerShell, then loads a kernel driver using a flaw in the code signing system.

The PowerShell exploit is, in effect, a sandbox escape. It does not require Administrator privilege, but all you get is native code execution at the same privilege as your user account.

The kernel driver loading bug requires Administrator privilege; it is not bypassing the requirement of your account needing Administrator privilege to ask the Service Control Manager to load a driver on your behalf. In Raymond Chen terms, it's "already on the other side of the airtight hatchway".

The hack is designed to be automatically started and permanent; once installed, it'll load at each boot, until you uninstall it. It won't load if Safe Mode is enabled, to aid with troubleshooting. When it loads, it will write to the Security audit log to indicate that it has jailbroken the system. Also, I plan on enabling the desktop watermark as if a prerelease build and changing the text to "Jailbroken" or similar.

Melissa

Great news!!! This will permit the Surface 2 to be the best ARM tablet produced until now! … Thanks for all your work
The Following User Says Thank You to jeky82 For This Useful Post: [ View ] Gift jeky82 Ad-Free
18th November 2013, 05:44 PM |#452  
Senior Member
Thanks Meter: 20
 
More
Quote:
Originally Posted by jeky82

Great news!!! This will permit the Surface 2 to be the best ARM tablet produced until now! … Thanks for all your work

If Nokia 2520 don't launch before it release.
21st November 2013, 08:00 AM |#453  
Senior Member
Thanks Meter: 121
 
More
Quote:
Originally Posted by hisoft

If Nokia 2520 don't launch before it release.

Nah the Nokia can't even stand on it's own, such a baby. Surface be like, let me help you, lean on me.
The Following 3 Users Say Thank You to wardh For This Useful Post: [ View ] Gift wardh Ad-Free
25th November 2013, 11:01 AM |#454  
coldbloc's Avatar
Member
Thanks Meter: 8
 
More
Prompt
@ netham45, wondering if you or someone in-the-know could take a look at this and give me some quick and dirty info on how to use the cdb.exe tool from your Toolâ„¢

Looking for a simple (to a developer's ear) explanation of what this RT Jailbreak inject payload is doing and how to use the cdb.exe. To me it looks like it does on-the-fly hex edit of winsrv.dll and those 0x####'s are starting offsets. Just curious if I am right/wrong and if I could re-write this snippet / use cdb.exe to patch a different dll in a regular Windows Desktop. (thus avoiding frankenbuild) Basically I want to patch a single file at multiple offsets in memory every reboot and was hoping this cdb.exe is the ticket.

Is this just the an umodified cdb.exe from the DDK or is it 'special' for RT Jailbreak or just debugging 'RT' in general.

Code:
rem Inject payload and hook
cdb -pvr -p %PID% -c "e winsrv.dll+0x3644 0d f0 dc b8;e winsrv.dll+0x10800 2D E9 FF 1F EB 46 84 B0 4F F4 00 53 03 93 4F F0 00 03 02 93 04 23 01 93 4F F4 80 53 00 93 03 AB 00 22 02 A9 4F F6 FF 70 CF F6 FF 70 4F F0 16 0C 01 DF 00 23 4F F4 00 52 02 99 0B 20 4F F0 34 0C 01 DF 02 99 C9 68 4E F6 F0 77 C0 F2 07 07 88 46 DF F8 64 90 C8 44 0C 23 1A AA 02 F1 04 05 C5 F8 00 80 09 21 6F F0 01 00 41 F2 E1 0C 01 DF 7F 1E 00 2F F0 D1 02 99 D1 F8 24 1B 40 F2 25 07 C0 F2 00 07 88 46 DF F8 34 90 C8 44 0C 23 1A AA 02 F1 04 05 C5 F8 00 80 09 21 6F F0 01 00 41 F2 E1 0C 01 DF 7F 1E 00 2F F0 D1 DD 46 BD E8 FF 1F 07 46 00 2F FD E7 F2 F7 CB BE %signinglevel% %ciOptions%;.detach;q" 1>nul 2>nul
http://msdn.microsoft.com/en-us/library/ff539058.aspx

What is the significance of the "e" in "e winsrv.dll" Is it this.

Quote:

-e Event

Signals the debugger that the specified event has occurred. This option is only used when starting the debugger programmatically.

25th November 2013, 11:04 AM |#455  
OP Inactive Recognized Developer
Flag Denver
Thanks Meter: 565
 
Donate to Me
More
Quote:
Originally Posted by coldbloc

Howdy netham45, wondering if you or someone in-the-know could take a look at this and give me some quick and dirty info on how to use the cdb.exe tool from your Toolâ„¢

Looking for a simple (to a developer's ear) explanation of what this RT Jailbreak inject payload is doing and how to use the cdb.exe. To me it looks like it does on-the-fly hex edit of winsrv.dll and those 0x####'s are starting offsets. Just curious if I am right/wrong and if I could re-write this snippet / use cdb.exe to patch a different dll in a regular Windows Desktop. (thus avoiding frankenbuild) Basically I want to patch a single file at multiple offsets in memory every reboot and was hoping this cdb.exe is the ticket.

Is this just the an umodified cdb.exe from the DDK or is it 'special' for RT Jailbreak or just debugging 'RT' in general.

Code:
rem Inject payload and hook
cdb -pvr -p %PID% -c "e winsrv.dll+0x3644 0d f0 dc b8;e winsrv.dll+0x10800 2D E9 FF 1F EB 46 84 B0 4F F4 00 53 03 93 4F F0 00 03 02 93 04 23 01 93 4F F4 80 53 00 93 03 AB 00 22 02 A9 4F F6 FF 70 CF F6 FF 70 4F F0 16 0C 01 DF 00 23 4F F4 00 52 02 99 0B 20 4F F0 34 0C 01 DF 02 99 C9 68 4E F6 F0 77 C0 F2 07 07 88 46 DF F8 64 90 C8 44 0C 23 1A AA 02 F1 04 05 C5 F8 00 80 09 21 6F F0 01 00 41 F2 E1 0C 01 DF 7F 1E 00 2F F0 D1 02 99 D1 F8 24 1B 40 F2 25 07 C0 F2 00 07 88 46 DF F8 34 90 C8 44 0C 23 1A AA 02 F1 04 05 C5 F8 00 80 09 21 6F F0 01 00 41 F2 E1 0C 01 DF 7F 1E 00 2F F0 D1 DD 46 BD E8 FF 1F 07 46 00 2F FD E7 F2 F7 CB BE %signinglevel% %ciOptions%;.detach;q" 1>nul 2>nul
http://msdn.microsoft.com/en-us/library/ff539058.aspx

It's just the normal CDB from the DDK for 8.0. Do note that it only edits a .dll in memory within that one application's memory space (ex. only csrss instance specified by %PID% sees the changed winsrv.dll).

Everything else you stated is correct. To get the address of winsrv.dll I do need the .pdb for it, though, which MS so graciously gave out.

Edit: What was I smoking? You don't need a PDB to get the address of a module.
The Following 2 Users Say Thank You to netham45 For This Useful Post: [ View ] Gift netham45 Ad-Free
25th November 2013, 11:29 AM |#456  
coldbloc's Avatar
Member
Thanks Meter: 8
 
More
Prompt That was quick.
Quote:
Originally Posted by netham45

It's just the normal CDB from the DDK for 8.0. Do note that it only edits a .dll in memory within that one application's memory space (ex. only csrss instance specified by %PID% sees the changed winsrv.dll).

Everything else you stated is correct. To get the address of winsrv.dll I do need the .pdb for it, though, which MS so graciously gave out.

I see. So for my case, would first need the pid of svchost.exe, (1671 for example) and it'd only be patching it's view of the dll. Understood.

I can get the offsets from HxD, for instance "C1B51", now imagine I want to NOP a few bits.

Code:
cdb -pvr -p "1671" -c "e winsrv.dll+0xC1B51 90 90 90;e winsrv.dll+0xF40A2 90 90 90;.detach;q"
Do I need any of that signinglevel stuff or ciOptions in a Windows Desktop ?

%signinglevel% %ciOptions%;.detach;q"
25th November 2013, 11:31 AM |#457  
OP Inactive Recognized Developer
Flag Denver
Thanks Meter: 565
 
Donate to Me
More
Quote:
Originally Posted by coldbloc

I see. So for my case, would first need the pid of svchost.exe, (1671 for example) and it'd only be patching it's view of the dll. Understood.

I can get the offsets from HxD, for instance "C1B51", now imagine I want to NOP a few bits.

Code:
cdb -pvr -p "1671" -c "e winsrv.dll+0xC1B51 90 90 90;.detach;q"
Do I need any of that signinglevel stuff or ciOptions in a Windows Desktop ?

%signinglevel% %ciOptions%;.detach;q"

The ;detach;q simply detaches from the process then quits out of CDB (I'm more or less running a script with this).

Out of curiosity, what service are you patching?
25th November 2013, 11:36 AM |#458  
coldbloc's Avatar
Member
Thanks Meter: 8
 
More
Quote:
Originally Posted by netham45

The ;detach;q simply detaches from the process then quits out of CDB (I'm more or less running a script with this).

Out of curiosity, what service are you patching?

termsrv.dll
25th November 2013, 11:38 AM |#459  
OP Inactive Recognized Developer
Flag Denver
Thanks Meter: 565
 
Donate to Me
More
Quote:
Originally Posted by coldbloc

termsrv.dll

Trying to enable the server? If you get anywhere with that let me know, I'd be interested to see it. I spent a while looking into getting it working and never got anywhere. I never did anything with editing the running process, though; I just manipulated various registry keys into thinking I was on Win 8 pro. I believe there's a thread about it somewhere on here.
25th November 2013, 11:44 AM |#460  
coldbloc's Avatar
Member
Thanks Meter: 8
 
More
Prompt
Quote:
Originally Posted by netham45

Trying to enable the server? If you get anywhere with that let me know, I'd be interested to see it.

Sunstar of MDL has disassembled the thing, knows a lot more about it than me.

http://forums.mydigitallife.info/thr...l=1#post846387

To answer mine own question - (see title above) - Here and Here and some other stuff
25th November 2013, 03:21 PM |#461  
coldbloc's Avatar
Member
Thanks Meter: 8
 
More
Prompt
Quote:
Originally Posted by netham45

Trying to enable the server? If you get anywhere with that let me know, I'd be interested to see it. I spent a while looking into getting it working and never got anywhere. I never did anything with editing the running process, though; I just manipulated various registry keys into thinking I was on Win 8 pro. I believe there's a thread about it somewhere on here.



EDIT: Added some details in this thread

http://forum.xda-developers.com/show...0&postcount=20
Thread Closed Subscribe to Thread

Tags
hack, jailbreak, windows, windows rt, winrt
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes