pool_party_rs is a cutting-edge remote process injection tool designed for cybersecurity research and penetration testing.
It leverages advanced techniques described in SafeBreach’s blog on Windows thread pool abuse and is inspired by the PoolParty project on GitHub.
This tool currently implements the first two variants of the PoolParty process injection techniques, with plans to expand its capabilities in the future.
pool_party_rs WorksThe tool utilizes Windows Thread Pool mechanisms to inject malicious code into target processes. Here’s a breakdown of its operation:
OpenProcess to gain access to the target process.NtQueryInformationProcess and checks each handle type with NtQueryObject to locate a “TpWorkerFactory” handle.NtQueryInformationWorkerFactory, it extracts the start routine address of the worker factory.WriteProcessMemory.NtSetInformationWorkerFactory, which executes the shellcode.This variant modifies the thread pool task queue by injecting a malicious task into it. When executed, this task runs the injected shellcode, effectively compromising the target process.
To integrate pool_party_rs into your Rust project, add this dependency to your Cargo.toml:
[dependencies]
pool_party_rs = { git = "https://github.com/Teach2Breach/pool_party_rs" } use pool_party_rs::wrapper;
let info_string = wrapper(&SHELL_CODE, pid, variant);
println!("{}", info_string); Run the proof-of-concept (PoC) with:
cargo run <pid> <variant> The current version does not prioritize operational security (OPSEC) considerations like dynamic API resolution. However, an OPSEC-safe version will be released on a dedicated branch approximately one month after the initial release.
pool_party_rs demonstrates innovative abuse of Windows thread pools for process injection, making it a valuable resource for cybersecurity professionals studying evasion techniques.
By exploiting legitimate system functionalities, it highlights gaps in modern detection systems and underscores the importance of continuous advancements in endpoint security solutions.
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…
In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…