Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/gellin/TeamViewer_Permissions_Hook_V1
A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
https://github.com/gellin/TeamViewer_Permissions_Hook_V1
cplusplus cpp dll-injection hooking memory-hacking penetration-testing security teamviewer x86
Last synced: 14 days ago
JSON representation
A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
- Host: GitHub
- URL: https://github.com/gellin/TeamViewer_Permissions_Hook_V1
- Owner: gellin
- License: mit
- Created: 2017-12-03T22:23:12.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2017-12-07T14:54:40.000Z (almost 7 years ago)
- Last Synced: 2024-07-31T01:29:10.936Z (3 months ago)
- Topics: cplusplus, cpp, dll-injection, hooking, memory-hacking, penetration-testing, security, teamviewer, x86
- Language: C++
- Size: 561 KB
- Stars: 311
- Watchers: 27
- Forks: 77
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# TeamViewer Permissions Hook V1
---
[![License](http://img.shields.io/badge/license-MIT-green.svg)](https://github.com/gellin/TeamViewer_Permissions_Hook_V1/blob/master/LICENSE)**A proof of concept injectable C++ DLL, that uses naked inline hooking and direct memory modification to change TeamViewer permissions.**
## Features
* **As the Server** - Enables extra menu item options on the right side pop-up menu. Most useful so far to enable the "switch sides" feature which is normally only active after you have already authenticated control with the client, and initiated a change of control/sides.
* **As the Client** - Allows for control of mouse with disregard to servers current control settings and permissions.## Demo
#### As the Server
![](server_switch_sides.gif?raw=true)#### Client
![](client_takes_control.gif?raw=true)## Rundown
* Utilizes signature/pattern scanning to dynamically locate key parts in the code at which the assembly registers hold pointers to interesting classes. Applies inline naked hooks a.k.a code caves, to hi-jack the pointers to use for modification via direct memory access to their reversed classes.
* Inject and follow the steps## Requirements
* Your favorite Manual Mapper, PE Loader, DLL Injector, inject into - "TeamViewer.exe"
* This version was Built on Windows 10, for TeamViewer x86 Version 13.0.5058 - (Other versions of TeamViewer have not been tested but with more robust signatures it may work, linux not supported)## Disclaimer
* Developed for educational purposes as a proof of concept for testing. I do not condone the or support the use of this software for unethical or illicit purposes. No responsibility is held or accepted for misuse.## Credit
[@timse93](https://github.com/timse93) - Research and Testing