A proof of concept project which hijacks Hyper-Vs VM Exit handler at runtime using DDMA.
hypervpreview.mp4
Read at readcc.net, archived at archive.org.
- AMD CPU with Virtualization Capabilities (Intel support in theory possible)
- Windows 11 24H2 (requires offset update in
GetVmcbfunction inhyperv.hppotherwise) - IOMMU Disabled
- Hyper-V Enabled
- Compile the project using Visual Studio 2022 and WDK.
- Use a tool like HXD or bintoc to copy the bytes of
payload.systopayloadDatainside ofpayloadBytes.h - Run loader passing kernel driver as parameter
- Run usermode
- Profit!