loneicewolf / smbdoor

improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

smbdoor

🟢 Fixed crash/shellcode not executing. see callbacks.c for more info.


"old" below

☢️ finally Win11 soon done

Windows 11 now works; but will need to do further testing

ExtraPulsar

The proof-of-concept smbdoor.sys driver is a silent remote backdoor that does not bind new sockets or perform function modification hooking. Instead it abuses undocumented APIs in srvnet.sys to register itself as a valid SMB handler. It then listens on the already-bound ports 139/445 for special packets in which to execute secondary shellcode. In several ways, it has similarities with DoublePulsar and DarkPulsar, as well as ToxicSerpent.

Of course, it comes with practical limitations that make it mostly an academic exploration, but I thought it might be interesting to share, and is possibly something EDR products should monitor.

Detection:

About

improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys

License:Apache License 2.0


Languages

Language:C 95.5%Language:Python 3.4%Language:Batchfile 1.2%