-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Payload doens't fire #2
Comments
so, the payload runs and terminates? or it crashes? try to debug it and see what is happening inside the payload, maybe it was not able to open a socket or so, and just exited. if it was able to run even for a moment, it means it is not an issue with the loader. |
The payload ist just doing nothing. I tried to debug of course but I cannot attach to the newly generated process. Error message by X64dbg: Debugging finished! where 2a10 is the process id |
please share the payload, and I will test what exactly is going on... |
Well, I just used a simple PS: Trying with a GUI program as payload like winobj64.exe, it works fine. Using procexp64.exe generates an error message: Sp obviously the "payload" should fullfill certain criterias............ |
ok, so first of all, regarding the attaching to the child process:
Indeed in case of this technique, as well as in Doppelganging x64dbg does not allow to attach at this stage (before the first thread is run). But there is a workaround for this, that I helped me debug such processes:
That's how you can follow the execution further. |
This technique, as well as Doppelganging requires manual setup of the full process environment, and many parameters manually: https://github.com/hasherezade/process_ghosting/blob/master/main.cpp#L158 |
Thanks for the hints and taking the time to answer. |
You are welcome, when I will get some free time I will see in details what is missing for this payload to execute completely. BTW - check also transacted_hollowing - recently I implemented a version that is like a merge with Process Ghosting - uses delete-pending file instead of a transacted file. https://github.com/hasherezade/transacted_hollowing/blob/main/main.cpp#L14 You can choose which version to build by using a CMake flag: |
Thanks a lot, transacted_hollowing works like a charm! Awesome work ! |
I've had the same problem, but I can't run after I change the process information, and can tell me which one you changed :) |
I changed RtlCreateProcessParametersEX() parameters, but It's not work |
I created a reverse shell with msfvenom, precisely an exe file, but it won't fire:
'E:\process_ghosting-master\Debug>proc_ghost.exe msf_rev_https.exe
[+] Created temp file: C:\Users\fancy\AppData\Local\Temp\THCFE8.tmp
[+] Information set
[+] Written!
PEB address: 2d7000
ImageBase address: 140000000
[+] Parameters mapped!
PEB address: 2d7000
PEB address: 2d7000
ProcessParameters addr: 0000025FD11A8F30
[+] Process created! Pid = 31e0
EntryPoint at: 140004000
[+] Done!'
The process is created and disappears after a few seconds.
The file msf_rev_https.exe works fine btw.
The text was updated successfully, but these errors were encountered: