Skip to content

This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.

License

Notifications You must be signed in to change notification settings

Offensive-Panda/WPM-MAJIC-ENTRY-POINT-INJECTION

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

WPM-MAJIC-ENTRY-POINT-INJECTION

This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode. Exploit also using direct syscalls to bypass user-mode hooking of AV/EDRs. This technique is avoiding the usage of VirtualAlloc, VirtualProtect APIs directly inside the code. The working of VirtualProtect will be covered by WPM magic.

Note

The Main Purpose of this program is to highlight the internal working of WriteProcessMemory() not to Bypass EDRs hook. That's why I used WriteProcessMemory() directly into code instead of direct calls.

WORKING FLOW

  1. Get PEB address and pointer to image base address
  2. Get process image base address
  3. Read target process image headers
  4. Get AddressOfEntryPoint (RX region)
  5. Write shellcode to image entry point and execute it (WPM MAGIC HERE)

USAGE

  1. Compile the code in Visual Studio and execute Simple :)
  2. If you guys face any error while compilation, please make sure MASM should be enabled in your solution file build customization.
EPINJ.mp4

ONLY FOR EDUCATIONAL PURPOSES

About

This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission and write the shellcode.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published