Jump to content

Recommended Posts

Posted

Dear Everyone,

What security measures do I have to deal with when hacking NTOSKRNL.EXE? is there a way to circumvent them? so I add my bootscreen background? John:thumbup :whistle:


Posted

Hi John

I answered at the sevenforums; http://www.sevenforums.com/customization/106861-how-change-boot-animation-windows-7-a-32.html#post1059879

You can modify the bootscreen as was done in XP, by modifying the embedded image in the kernel. However, since the kernel wil get an invalidated certificate from this hack (like all mods), you must either configure testsigning, or implement the patches as already descibed ealier, in bootmgr and winload.exe (yes I've boot with almost each and every boot-related file with bad checksum (which by definition also will have an invalidated digital certificate of course).

So it is without doubt a security issue as you cannot selectively choose which files to not perform checks on. Well, you can, sort of but that is before the kernel is loaded anyway.

About the colorfulness of the bootscreen, I think it is as restricted as it was for the same hack for XP. And you cannot implement both (ie bootscreen + animation). You must choose one of them.

Joakim

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...