FindObjects-BOF is a Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles.
What Is This Repository For?
Why Do I Need This?
Utilizing direct systems calls via inline assembly in BOF code provides a more opsec safe way of interacting with the system. Using direct system calls avoids AV/EDR software intercepting user-mode API calls.
FindModule
bof can be used to identify processes which have a certain module loaded, for example the .NET runtime clr.dll
or the winhttp.dll
module. This information can be used to select a more opsec safe spawnto candidate when using Cobalt Strike’s execute-assembly
or before injecting an exfill beacon shellcode using the shinject
command.FindProcHandle
bof can be used to identify processes with a specific process handle in use, for example processes using a handle to the lsass.exe
process. If there’s a process within the system with a lsass.exe
process handle, we could use this existing process/handle to read or write memory without opening a new process handle. This bypasses certain AV/EDR’s capabilities of detecting and blocking LSASS process/memory access.How Do I Set This Up?
We will not supply compiled binaries. You will have to do this yourself:
sudo port install mingw-w64
).make
command to compile the Beacon object file.Script Manager
to load the FindObjects.cna script.FindProcHandle
or FindModule
command with the required parameters (e.g. module or process name).Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…