FindObjects-BOF is a Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles.
What Is This Repository For?
Why Do I Need This?
Utilizing direct systems calls via inline assembly in BOF code provides a more opsec safe way of interacting with the system. Using direct system calls avoids AV/EDR software intercepting user-mode API calls.
FindModule
bof can be used to identify processes which have a certain module loaded, for example the .NET runtime clr.dll
or the winhttp.dll
module. This information can be used to select a more opsec safe spawnto candidate when using Cobalt Strike’s execute-assembly
or before injecting an exfill beacon shellcode using the shinject
command.FindProcHandle
bof can be used to identify processes with a specific process handle in use, for example processes using a handle to the lsass.exe
process. If there’s a process within the system with a lsass.exe
process handle, we could use this existing process/handle to read or write memory without opening a new process handle. This bypasses certain AV/EDR’s capabilities of detecting and blocking LSASS process/memory access.How Do I Set This Up?
We will not supply compiled binaries. You will have to do this yourself:
sudo port install mingw-w64
).make
command to compile the Beacon object file.Script Manager
to load the FindObjects.cna script.FindProcHandle
or FindModule
command with the required parameters (e.g. module or process name).Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…
The main objective of the creation of this laboratory is to transport the applications, tools…
"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…
Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…
This repository was created with the aim of assisting companies and independent researchers about Tactics,…
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…