GeistHaus
log in · sign up

https://feeds.feedburner.com/RewolfsBlog

rss
10 posts
Polling state
Status active
Last polled May 19, 2026 02:48 UTC
Next poll May 20, 2026 04:22 UTC
Poll interval 86400s
Last-Modified Mon, 18 May 2026 12:44:19 GMT

Posts

Reverse engineering Mortal Kombat GRA file format (part 2)
assemblyprogrammingpythonretrogamingreverse engineeringsource code
Disclaimer: This post is aimed at retro-gaming preservation and code-archeology. All product names, trademarks, and registered trademarks are the property of their respective owners. 933 days, this is the amount of time that passed since part 1 of that blog post. I had almost all work done back in 2018, I was just missing one […]
http://blog.rewolf.pl/blog/?p=1982
Extensions
Reverse engineering Mortal Kombat GRA file format (part 1)
programmingpythonretrogamingreverse engineeringsource codetools
Disclaimer: This post is aimed at retro-gaming preservation and code-archeology. All product names, trademarks and registered trademarks are property of their respective owners. GRA files are used by the PC DOS version of Mortal Kombat 1 and 2 (available on GOG) to store all kinds of graphics. There are two different types of GRA files: […]
http://blog.rewolf.pl/blog/?p=1837
Extensions
PCAUSA Rawether for Windows local privilege escalation
assemblypwnreverse engineeringsource codewindows internalsx64
Rawether for Windows is a framework that facilitates communication between an application and the NDIS miniport driver. It’s produced by a company named Printing Communications Assoc., Inc. (PCAUSA), which seems to be no longer operating. Company websites can be still reached through web.archive.org: http://web.archive.org/web/20151017034756/http://www.pcausa.com/ http://web.archive.org/web/20151128171809/http://www.rawether.net/ Rawether framework provides NDIS Protocol Driver similar to the NPF.SYS […]
http://blog.rewolf.pl/blog/?p=1778
Extensions
GoGoGadget – kernel exploitation helper class
programmingpwnsource codetoolswindows internalsx64
The aim of this class is to facilitate building kernel shell-codes and ROP chains (at least before RFG kicks in sometime next year) by providing easy access to some of the available kernel information leaks. Under the hood I am using well known NtQuerySystemInformation with following classes: SystemExtendedHandleInformation, SystemModuleInformation. This piece of code came to […]
http://blog.rewolf.pl/blog/?p=1739
Extensions
Leaking EPROCESS address of the specific SYSTEM processes
programmingreverse engineeringsource codewindows internalsx64
Today I would like to briefly describe a simple method of obtaining the EPROCESS addresses of some specific system processes, which can be later used as a part of the Local Privilege Escalation exploit. This is an extension to the well known NtQuerySystemInformation (SystemExtendedHandleInformation) EPROCESSes leak. In the typical scenario SystemExtendedHandleInformation class can be used […]
http://blog.rewolf.pl/blog/?p=1683
Extensions
MSI ntiolib.sys/winio.sys local privilege escalation
programmingpwnreverse engineeringsource codewindows internals
So, it seems that not only ASUS drivers allows unprivileged reading and writing to physical memory. Just a few months ago I was looking at the drivers that are loaded on my machine, and I found small MSI driver called NTIOLib_X64.sys. Out of curiosity I’ve looked at it in IDA and it turned out that […]
http://blog.rewolf.pl/blog/?p=1630
Extensions
IceCTF 2016 Slickserver/Slickerserver pwn writeup
assemblyctfprogrammingpwnpythonreverse engineeringx64
It’s almost 6 months since the last post, so to keep some good yearly average it’s finally time to write something here. For the last couple of months, most of my spare time went into various CTF challenges. Since I’m very new to CTFs, usually I’m not able to solve top scoring tasks and people […]
http://blog.rewolf.pl/blog/?p=1563
Extensions
SSCTF 2016 Quals Re5 writeup
crackmesctfreverse engineering
I neither play CTFs, nor I do writeups for them. Well, both statements are not true anymore, but don’t expect too much CTF writeups on this blog anyway. The task was worth 500 points and according to my knowledge nobody submitted the flag on time (including me as well). So, enjoy the reading and I […]
http://blog.rewolf.pl/blog/?p=1519
Extensions
wow64ext v1.0.0.8
programmingsource codetoolswindows internalsWoW64
New version of wow64ext library is available for download: http://rewolf.pl/stuff/rewolf.wow64ext.v1.0.0.8.zipor if someone prefer github:https://github.com/rwfpl/rewolf-wow64ext Changelog Fixed elusive bug that appears only on AMD cpus Removed VS CRT dependencies – dll size shrank to 9kB (previously 41kB) Added sanity checks, so x64 switch won’t run on x86 OS More details AMD case is really interesting as […]
http://blog.rewolf.pl/blog/?p=1484
Extensions
Terminus Project launch.
terminustoolswindows internals
I would like to announce launch of my new web-based tool: Terminus Project. It’s automatically generated diff of Windows structures with nice (I hope!) presentation layer. Currently it contains only data gathered from NTDLL PDBs (281 dlls at the moment of writing this post), but it can be easily extended with other libraries. Idea behind […]
http://blog.rewolf.pl/blog/?p=1438
Extensions