Skip to content

nixpal/ProcInjectSyscall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Process Injection using Windows SYSCALLS

Presented at D3FC0N 30

Author: Tarek Ahmed @Nixpal

dBi

INFO

  • All SYSCALL numbers used in the shellcode are for the latest 3 Windows 10 builds. They all use the same SYSCALL numbers.
  • The C file is used to execute the complete shellcode by injecting meterpreter into a process called CrypTool.exe
  • If you want a different process, please change the string accordingly in the inline assembly.
  • The complete sandwiched shellcode is separated in three chunks to make it easy for you to modify the meterpreter part.
  • If your meterpreter code is larger than mine, you need to modify the jmp instruction e9 86 01 00 00 jmp 0x194
  • So if your meterpreter size is larger or smaller, change the opcodes to match whether 0x195, 0x193, 0x196 or whatever the beginning of the shellcode.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages