Skip to content

thefLink/C-To-Shellcode-Examples

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

C-To-Shellcode-Examples

This repository contains examples on how to write C code which compiles down to an executable living fully in its text segment. Thus, when extracting the text segment you will obtain position independent code which you can encode with your favourite shellcode encoder.

The DownloadString_Syscalls program, makes use of direct syscalls to obtain memory. Syscalls were generated using Inline Whisperer Sample files are provided as .bin (raw extracted text segment) and .bin.sgn (text segment encoded with sgn. You can execute them using any shellcode loader.

Loader Creation

Since the output is 100% position independent, there are multiple ways to execute the code. One is to use traditional shellcode loaders / injectors. Another way is to simply take an existing .exe file and overwrite the part of the .text segment to which the entrypoint in optional_header points with the PIC. I have added loaderbuilder.py to automate this.

python loaders\loaderbuilder.py -shellcode .\HelloWorld\HelloWorld.bin -loader C:\Users\user\Desktop\notepad.exe -output C:\Users\user\Desktop\cool.exe

Obviously this doesnt work with encoded PIC, since the .text segment is not writable by default.
Please note, that the .exe file needs to be copied from system32 to somewhere else before patching. This appears to be a bug in python-lief, but I can't narrow it down :'(.

Credits

The idea has been well described by various researchers and is nothing new, please see:

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published