ThreadBoat – Thread Execution Hijacking Program to Inject Native Shell Code Into a Standard Win32 Application

ThreadBoat - Thread Execution Hijacking Program to Inject Native Shell Code Into a Standard Win32 Application Create EXE windows software malware

ThreadBoat

Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application.

About

This prgram is developed to continue an experiences of different code injection methods and to allow RedTeam security professionals to utilize this method as a unique way to perform software penetration testing.

With Thread hijacking, it allows the hijacker.exe program to susepend a thread within the target.exe program allowing us to write shellcode to that target thread, and later be executed (via; WriteProcessMemory(), SetThreadContext(), ResumeThread(), CreateThread()).

Usage

int main()
{
	System sys;
	Interceptor incp;
	Exception exp;

	sys.returnVersionState();
	if (sys.returnPrivilegeEscalationState())
	{
		std::cout << "Token Privileges Adjusted\n";
	}
	
	if (DWORD m_procId = incp.FindWin32ProcessId((PCHAR)m_win32ProcessName))
	{
		incp.ExecuteWin32Shellcode(m_procId);
	}

	system("PAUSE");
	return 0;
}

For Further Information On Thread Execution Hijacking

https://capec.mitre.org/data/definitions/30.html

Ethical Notice

This code was simply written to demonstrate an overlooked method to inject shellcode or a DLL into a Win32 program. This code is not to be used for malicous purposes. The author, Josh Schiavone, is not liable for misuse of this software.


ThreadBoat - Thread Execution Hijacking Program to Inject Native Shell Code Into a Standard Win32 Application Create EXE windows software malware
Next Post

No more post

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

one × five =