timwhitez starred DataInject-BOF
文章介绍了一种基于beacon对象文件的进程注入概念验证实现,通过重写combase.dll中的Control Flow Guard函数指针劫持控制流。推荐使用explorer.exe作为目标进程,并要求shellcode为64位。该方法已在Windows 10和11的部分版本上测试成功。 2025-4-24 03:25:54 Author: github.com(查看原文) 阅读量:13 收藏

A beacon object file implementation of the process injection proof-of-concept from my blog post Control Flow Hijacking via Data Pointers.

Hijacks control flow via overwriting combase.dll's Control Flow Guard function pointers called by COM proxying functions.

Important Notes

  • From my testing, explorer.exe is the current best candidate in terms of an easy triggering mechanism due to its heavy reliance on COM proxying. Would recommend experimenting.
  • Make sure shellcode is 64-bit as this BOF only supports 64-bit beacons & target processes.
  • This has only been tested on windows versions Win10 21H2 (19044.5737) & Win11 24H2 (26100.3775).

Usage

datainject <pid> <shellcode path>

Examples

For sake of example, all process id's have been assumed to be 1234

Inject into explorer.exe, execute shellcode upon COM call (can be triggered by right clicking or opening file explorer)

datainject 1234 C:\users\attacker\payloads\beacon_x64.bin

References


文章来源: https://github.com/iilegacyyii/DataInject-BOF
如有侵权请联系:admin#unsafe.sh