Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/evilbytecode/bloxstrap-persistance
Bloxstrap-Persistance modifies Bloxstrap's settings (Settings.json) to add persistent integrations, showcasing how applications can be exploited.
https://github.com/evilbytecode/bloxstrap-persistance
bloxstrap grabber persistence red-team roblox-logger tactics
Last synced: 4 days ago
JSON representation
Bloxstrap-Persistance modifies Bloxstrap's settings (Settings.json) to add persistent integrations, showcasing how applications can be exploited.
- Host: GitHub
- URL: https://github.com/evilbytecode/bloxstrap-persistance
- Owner: EvilBytecode
- Created: 2024-06-17T10:45:58.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-06-17T11:11:57.000Z (6 months ago)
- Last Synced: 2024-07-11T13:59:22.793Z (6 months ago)
- Topics: bloxstrap, grabber, persistence, red-team, roblox-logger, tactics
- Language: Go
- Homepage:
- Size: 4.88 KB
- Stars: 5
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Bloxstrap-Persistance
Bloxstrap-Persistance is a proof-of-concept demonstration showcasing how to abuse the configuration files of a hypothetical application named Bloxstrap. By persistently modifying its settings file (`Settings.json`), this project adds custom integrations, potentially compromising the integrity and functionality of Bloxstrap.
## Proof of Concept (PoC)
Watch the PoC video to see the demonstration in action:
- [View PoC Video](https://streamable.com/fi1qp7)### Prerequisites
- Go (Golang) environment to compile and run the code.
- Bloxstrap installed on the target system.### Execution
1. **Locate Settings File:**
- The program attempts to find the `Settings.json` file in the user's Bloxstrap directory (`AppData/Local/Bloxstrap`).2. **Modify Settings:**
- If the `Settings.json` file exists, the program reads its current settings into a data structure.
- It then appends a custom integration (`newmalinter`) with predefined values:
- **Name:** "Evilbytecode was here"
- **Location:** "C:\\Windows\\System32\\cmd.exe"
- **LaunchArgs:** "start cmd.exe"
- **AutoClose:** false3. **Persist Changes:**
- The modified settings, now including the malicious integration, are written back to `Settings.json`, ensuring persistence across application launches.### Limitations
- **Dependency on Bloxstrap:** The success of this demonstration relies on Bloxstrap being installed and the `Settings.json` file being present in the specified directory.
- **Ethical Considerations:** Modifying software settings without consent can be unethical and potentially illegal. This code is strictly for educational purposes.### Disclaimer
- This project is intended for educational purposes only. Modifying software without explicit permission may violate terms of service and laws in your jurisdiction. Use responsibly and with caution.