Skip to content

zer0dac/Linux-Process-Injector-PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Disclaimer:

This tool is intended for educational and ethical hacking purposes only. Always obtain permission before testing any system or application. The developers are not responsible for any misuse or damage caused by this tool.

Usage

Environment Setup:

image

Creating Payload:

image

We applied -e x64/xor encoding to obfuscate the payload. This makes it harder for signature-based security tools (like antivirus or intrusion detection systems) to detect the shellcode. Simple XOR encoding also ensures low overhead compared to more complex encoders.

Executing victim process: The vulnerable_process is running as expected and remains in an active state, providing the necessary output:

image

If we don’t have these values, we could still locate the process using:

  • ps aux | grep vulnerable_process – To find the process ID and verify its status.
  • cat /proc//maps – To check memory mappings and identify a writable and executable memory region.

On the attacker machine a Metasploit listener was set up:

image image

Executing Exploit:

image image

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages