Skip to content

ipSlav/DirtyCLR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DirtyCLR

This research has been possibile with the support of Shielder who has sponsored it with the goal to discover new ways of blend-in within legitimate applications and raise awareness about uncovered sophisticated attack venues, contributing to the security of the digital ecosystem. Shielder invests from 25% to 100% of employees time into Security Research and R&D, whose output can be seen in its advisories and blog. If you like the type of research that is being published, and you would like to uncover unexplored attacks and vulnerabilities, do not hesitate to reach out.

dirtyclr_logo

An App Domain Manager Injection DLL PoC on steroids with a clean Thread Call Stack and no direct WinAPI calls.
More information about this tool can be found in the Let Me Manage Your AppDomain blogpost.

Usage guide:

This project already contains a key.snk and an enc.bin msfvenom messagebox payload

  1. Create a raw format .bin shellcode and encrypt it with xor3.py
  2. Install microsoft SDK and navigate into C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools
  3. Run sn.exe -k key.snk and copy your new key.snk to whatever folder you prefer
  4. Open the DirtyCLR solution, right click on Project Properties, select Properties, navigate on Signing and then <Browse...> to upload your key.snk
  5. Right click again on Project Properties, select Add=>Existing Item... to upload your enc.bin
  6. Click on the newly addedd enc.bin and in its Properties select Embedded Resource from the Build Action dropdown menu
  7. Save everything and build

Credits

About

An App Domain Manager Injection DLL PoC on steroids

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published