-
Notifications
You must be signed in to change notification settings - Fork 712
Add support for PoolParty WorkerFactory Overwrite variant #764
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for PoolParty WorkerFactory Overwrite variant #764
Conversation
|
Is there a scenario where this technique will work while the existing one won't? I don't think our goal is to cover all of the PoolParty techniques since we only need one that suits our need and the user can't select which to use. We'd be more interested in adding the existing PoolParty support to x86 to expand our coverage. |
|
@smcintyre-r7, This technique is the good candidate to cover the following missing ones: x86 -> x86. that's because we don't have clear idea of the x64 -> wow64 This may be a long-shot, but based on the #710 (comment) comment of mine, i think with the WorkerFactory technique we can bypass the control flow guard check happening in wow64 context EDIT: This is outside of the scope of this PR... We will circle back fo WoW64 |
Windows 7 x64 & x86 |
PR CURRENTLY BLOCKEDThis PR is currently blocked until we fix our gem building system. Thanks a lot @xHector1337 for your amazing work! 25/09/2025 PR IS NOT BLOCKED ANYMORE |
|
Windows XP Pro SP 2 x64 ** Windows XP Pro SP 3 x86 ** |
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
c7c36b5 to
a771597
Compare
Windows XP SP3 x86Windows 7 x86Windows 7 x64Windows 8 x86Windows 8 x64Windows 8.1 x86Windows 8.1 x64Windows 10 x86Windows 10 x64Windows 11 |
smcintyre-r7
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was able to test the debug build here for the following cases and they all worked as expected.
- Windows 7 SP1 x86
- Windows 11 x64 (WOW64 -> WOW64)
- Windows 10 x86
smcintyre-r7
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @xHector1337 for your work on this!
Includes changes from: * rapid7/metasploit-payloads#764 * rapid7/metasploit-payloads#786
This PR extends current PoolParty functionalities to:
x86 -> x86(native not wow64) on Windows 10+Technique only works on Windows 10+ x86
The injection are achieved by adding a new variant, the 'Worker Factory Start Routine Overwrite`
TEST
<metasploit-framework>/data/meterpreter/msfconsoleuse payload/windows/meterpreter_reverse_tcp(or staged version. it doesn't matter)set MeterpreterDebugBuild trueset MeterpreterDebugLogging rpath:C:/Windows/Temp/doo.txtmigrate <notepad pid>