Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Powerloader and threadHijack is not working on my machine #1

Open
zhangpeter1991 opened this issue Aug 22, 2018 · 1 comment
Open

Comments

@zhangpeter1991
Copy link

Dear Author,

I tried Powerloader and threadHijack on my Win10 VM, it seems like they are not working. Is it because of the shellcode? or the offset?

@aaaddress1
Copy link
Owner

HI zhangpeter:

That PoC code of Powerloader is based on x86 Windows, so there're only 32bit memory layout and shellcode in this PoC. But this vector effects 64bit Windows too. Here's a wonderful project support x86/x64: https://github.com/BreakingMalware/PowerLoaderEx

I found MicroSoft have patched threadHijacking Attack on Win10 just in this month. It should be said: MicroSoft add more check in x64bit Windows before calling the shellcode (just like this photo). But this vulnerability still works well on x86bit. However, it seems like this vulnerability still appears on x64bit, just need to use another way to effect the address called by RtlUserThreadStart, and bypass the check.

I'll try to attack this vulnerability again, and look for a good solution to bypass it. Thanks for your attention ;)

7

default

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants