Run executables from memory, over the network, on Windows, Linux, OpenVMS

栏目: IT技术 · 发布时间: 5年前

内容简介:Run the client side of NetELF to download and execute a program over the network from a server. The server sends an arbitrary binary and command-line arguments.Where possible it will execute the program in-memory, it will not leave files on the filesystem.

NetELF

Run the client side of NetELF to download and execute a program over the network from a server. The server sends an arbitrary binary and command-line arguments.

Where possible it will execute the program in-memory, it will not leave files on the filesystem. This makes it ideal for pentests, emergencies and general systems automation.

Originally inspired by a post on this post on comp.unix.programmer .

Supported Platforms

Fully supported & tested:

  • Linux
  • Windows 7

Regularly tested & partially supported:

  • Solaris x86, Sparc
  • OpenVMS VAX, Alpha
  • Ultrix VAX, RISC
  • Windows 95+, NT 3.51+

Others that it should work on

  • FreeBSD
  • OSX
  • OSF/1
  • HP-UX
  • QNX
  • z/OS

Example

make
./server.py /bin/ls -la &> /dev/null &
./netelf 127.0.0.1 1337
./netelf 127.0.0.1 1337

In-memory Execution

I looked into the source code for glibc and musl to see what goes on behind the scenes, interesting, it executes the file from /proc/self/fd/%d .

See the following:

Mount options on tmpfs permiate through to /proc/self/fd/ , so to disable you need to add noexec to /dev/shm and other tmpfs mounts:

sudo mount /dev/shm/ -o remount,rw,nosuid,nodev,noexec -t tmpfs

This causes fexecve: Permission denied because the shm_open succeeded, but silently the file descriptor didn't get +x permission, doing fchmod on the handle won't work either. The file permissions can be checked with fstat .

Regarding which executables will work with this technique, the most reliable have been self-contained, statically linked executables. In some cases (where the same libc was used on the host used to compile the executable and on the host it is being executed on, and where both have the same libraries/dependencies), dynamically linked executables have worked. Executables which rely on specific environments or external files generally tend to fail.

Furthermore, it is possible to pass arguments to the executable you are running in-memory! The name of the process is derived from argv[0] , this can be customised using --argv0 [kthreadd] . By default it will use the basename of the executable file.


以上所述就是小编给大家介绍的《Run executables from memory, over the network, on Windows, Linux, OpenVMS》,希望对大家有所帮助,如果大家有任何疑问请给我留言,小编会及时回复大家的。在此也非常感谢大家对 码农网 的支持!

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

网络心理学

网络心理学

玛丽•艾肯 (Mary Aiken) / 中信出版社 / 2018-8-1 / CNY 58.00

《五十度灰》如何利用恋物心理,成为全球仅次于《圣经》的畅销读物? 为什么相对于亲朋好友,你更愿意向网络陌生人敞开心扉? 上网时总感觉时间飞逝,原来是网络的时间扭曲效应? 网络游戏中埋伏了哪些“上瘾”机关,暗中操控着你的行为? 为什么科技越发达,我们就越怕死? ...... 网络空间是一个巨大的兔子洞,里面集合了新奇、刺激、喜悦、痛苦、不安等各种元素。在日复一日的......一起来看看 《网络心理学》 这本书的介绍吧!

图片转BASE64编码
图片转BASE64编码

在线图片转Base64编码工具

URL 编码/解码
URL 编码/解码

URL 编码/解码

HSV CMYK 转换工具
HSV CMYK 转换工具

HSV CMYK互换工具