ThreadBoat - Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application
Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application.
About
I developed this small project to continue my experiences of different code injection methods and to allow RedTeam security professionals to utilize this method as a unique way to perform software penetration testing. With Thread hijacking, it allows the hijacker.exe program to susepend a thread within the target.exe program allowing us to write shellcode to that target thread, and later be executed (via; WriteProcessMemory(), SetThreadContext(), ResumeThread(), CreateThread()).
int main(){ System sys; Interceptor incp; Exception exp; sys.returnVersionState(); if (sys.returnPrivilegeEscalationState()) { std::cout << "Token Privileges Adjusted\n"; } if (DWORD m_procId = incp.FindWin32ProcessId((PCHAR)m_win32ProcessName)) { incp.ExecuteWin32Shellcode(m_procId); } system("PAUSE"); return 0;}
For Further Information On Thread Execution Hijacking
Click On The Link Below
https://capec.mitre.org/data/definitions/30.html
Environment
- Windows Vista+
- Visual C++
Libs
-
Winapi
- user32.dll
- kernel32.dll
-
ntdll.dll
Ethical Notice
This code was simply written to demonstrate an overlooked method to inject shellcode or a DLL into a Win32 program. This code is not to be used for malicous purposes. The author, Josh Schiavone, is not liable for misuse of this software. May God bless you all.
Via: www.kitploit.com
![ThreadBoat - Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsp89ta1dbmbnIN5HBLHV5q__DC-gEedhSgEVbD1CdgPjFMmZfpYXIHtTz-tuR15yl-w6Xt-3i-tBBPoWOKrlhGHI6hUaGypkAK2gK-dlvr0DuLsX_CFxIkRuNhXBJs6LfJzVmoTmOBx0/s72-c/h126.png)