Skip to content
forked from Srakai/Adun

A way to backdoor every process

License

Notifications You must be signed in to change notification settings

chutuananh2k/Adun

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

Adun is a PoC tool used to inject shellcode to the processes. This technique might be used by malicous programs to: hide it's process/ infect other processes on the system/ migrate to other process. In this moment Audn uses 3 techniques of injecting shellcode, which are: direct change of execution flow, spawning a process, spawning a thread. The last one might be the most interesting, as it doesn't harm process we inject to, and also makes the running shellcode well hidden. The whole injection is based on ptrace, and on most systems doesn't require root priviledges. Also the process/thread creation is done on raw syscalls which means, that the process we inject to doesn't even have to be linked to libc.

Usage

A quick demo of usage:

demo

./inject PID [-d -p]

There are 3 available injection techniques:

  • Direct shellcode execution in process - the 'victim' process execution will jump to shellcode
  • Spawnning new process
  • Spawning new thread

You can choose technique by giving parameter -d to use direct or -p to use process, the default technique is thread.

Requirements

  • x86_64 GNU/Linux (tested on Kali Linux 4.12.0-kali2-amd64)

Building

git clone https://github.com/Srakai/Adun.git
cd Adun
make

Author

  • @Srakai

License

This project is licensed under the GNU General Public License v3.0 - see the LICENSE.md file for details

About

A way to backdoor every process

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 99.5%
  • Makefile 0.5%