enumhandles.c 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255
  1. #include <windows.h>
  2. #include <stdio.h>
  3. #include <shlwapi.h>
  4. #include <Psapi.h>
  5. #include "enumhandles.h"
  6. #include "beacon.h"
  7. #pragma comment(lib, "shlwapi")
  8. //START TrustedSec BOF print code: https://github.com/trustedsec/CS-Situational-Awareness-BOF/blob/master/src/common/base.c
  9. #ifndef bufsize
  10. #define bufsize 8192
  11. #endif
  12. char *output = 0;
  13. WORD currentoutsize = 0;
  14. HANDLE trash = NULL;
  15. int bofstart();
  16. void internal_printf(const char* format, ...);
  17. void printoutput(BOOL done);
  18. int bofstart() {
  19. output = (char*)MSVCRT$calloc(bufsize, 1);
  20. currentoutsize = 0;
  21. return 1;
  22. }
  23. void internal_printf(const char* format, ...){
  24. int buffersize = 0;
  25. int transfersize = 0;
  26. char * curloc = NULL;
  27. char* intBuffer = NULL;
  28. va_list args;
  29. va_start(args, format);
  30. buffersize = MSVCRT$vsnprintf(NULL, 0, format, args);
  31. va_end(args);
  32. if (buffersize == -1) return;
  33. char* transferBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, bufsize);
  34. intBuffer = (char*)KERNEL32$HeapAlloc(KERNEL32$GetProcessHeap(), HEAP_ZERO_MEMORY, buffersize);
  35. va_start(args, format);
  36. MSVCRT$vsnprintf(intBuffer, buffersize, format, args);
  37. va_end(args);
  38. if(buffersize + currentoutsize < bufsize)
  39. {
  40. MSVCRT$memcpy(output+currentoutsize, intBuffer, buffersize);
  41. currentoutsize += buffersize;
  42. } else {
  43. curloc = intBuffer;
  44. while(buffersize > 0)
  45. {
  46. transfersize = bufsize - currentoutsize;
  47. if(buffersize < transfersize)
  48. {
  49. transfersize = buffersize;
  50. }
  51. MSVCRT$memcpy(output+currentoutsize, curloc, transfersize);
  52. currentoutsize += transfersize;
  53. if(currentoutsize == bufsize)
  54. {
  55. printoutput(FALSE);
  56. }
  57. MSVCRT$memset(transferBuffer, 0, transfersize);
  58. curloc += transfersize;
  59. buffersize -= transfersize;
  60. }
  61. }
  62. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, intBuffer);
  63. KERNEL32$HeapFree(KERNEL32$GetProcessHeap(), 0, transferBuffer);
  64. }
  65. void printoutput(BOOL done) {
  66. char * msg = NULL;
  67. BeaconOutput(CALLBACK_OUTPUT, output, currentoutsize);
  68. currentoutsize = 0;
  69. MSVCRT$memset(output, 0, bufsize);
  70. if(done) {MSVCRT$free(output); output=NULL;}
  71. }
  72. //END TrustedSec BOF print code.
  73. BOOL GetHandles(int basePid, const BYTE flags, int targetPid) {
  74. NTSTATUS status;
  75. PSYSTEM_HANDLE_INFORMATION handleInfo;
  76. ULONG handleInfoSize = 0x10000;
  77. HANDLE processHandle;
  78. ULONG i;
  79. char procHostName[MAX_PATH];
  80. BOOL foundHandle = FALSE;
  81. if (flags == QUERY_PROC) internal_printf("[+] PROCESS HANDLE RESULTS\n==========================================");
  82. else internal_printf("[+] THREAD HANDLE RESULTS\n==========================================");
  83. NtQuerySystemInformation_t pNtQuerySystemInformation = (NtQuerySystemInformation_t) GetProcAddress(GetModuleHandle("ntdll.dll"), "NtQuerySystemInformation");
  84. NtDuplicateObject_t pNtDuplicateObject = (NtDuplicateObject_t) GetProcAddress(GetModuleHandle("ntdll.dll"), "NtDuplicateObject");
  85. NtQueryObject_t pNtQueryObject = (NtQueryObject_t) GetProcAddress(GetModuleHandle("ntdll.dll"), "NtQueryObject");
  86. WCHAR Filter[100];
  87. switch(flags) {
  88. case QUERY_PROC: MSVCRT$swprintf_s(Filter, 50, L"%s", L"Process"); break;
  89. default: MSVCRT$swprintf_s(Filter, 50, L"%s", L"Thread"); break;
  90. }
  91. handleInfo = (PSYSTEM_HANDLE_INFORMATION) MSVCRT$malloc(handleInfoSize);
  92. while ((status = pNtQuerySystemInformation(SystemHandleInformation, handleInfo, handleInfoSize, NULL)) == STATUS_INFO_LENGTH_MISMATCH)
  93. handleInfo = (PSYSTEM_HANDLE_INFORMATION)MSVCRT$realloc(handleInfo, handleInfoSize *= 2);
  94. if (status != 0) {
  95. BeaconPrintf(CALLBACK_ERROR, "Failed to retrieve process information!\n");
  96. return 1;
  97. }
  98. for (i = 0 ; i < handleInfo->NumberOfHandles ; i++) {
  99. SYSTEM_HANDLE_TABLE_ENTRY_INFO objHandle = handleInfo->Handles[i];
  100. HANDLE dupHandle = NULL;
  101. POBJECT_TYPE_INFORMATION objectTypeInfo;
  102. PVOID objectNameInfo;
  103. UNICODE_STRING objectName;
  104. ULONG returnLength;
  105. if(objHandle.UniqueProcessId == 4) continue;
  106. if ((basePid != 0) && (objHandle.UniqueProcessId != basePid)) continue;
  107. if (objHandle.UniqueProcessId == KERNEL32$GetCurrentProcessId()) continue;
  108. if (!(processHandle = KERNEL32$OpenProcess(PROCESS_DUP_HANDLE | PROCESS_QUERY_INFORMATION, FALSE, objHandle.UniqueProcessId))) {
  109. continue;
  110. }
  111. KERNEL32$K32GetProcessImageFileNameA(processHandle, procHostName, MAX_PATH);
  112. if (!NT_SUCCESS(pNtDuplicateObject(processHandle, (void *) objHandle.HandleValue, KERNEL32$GetCurrentProcess(), &dupHandle, 0, 0, DUPLICATE_SAME_ACCESS))) {
  113. continue;
  114. }
  115. objectTypeInfo = (POBJECT_TYPE_INFORMATION) MSVCRT$malloc(0x1000);
  116. if (!NT_SUCCESS(pNtQueryObject(dupHandle, ObjectTypeInformation, objectTypeInfo, 0x1000, NULL))) {
  117. KERNEL32$CloseHandle(dupHandle);
  118. continue;
  119. }
  120. if (!SHLWAPI$StrStrIW(Filter, objectTypeInfo->Name.Buffer)) {
  121. MSVCRT$free(objectTypeInfo);
  122. KERNEL32$CloseHandle(dupHandle);
  123. continue;
  124. }
  125. objectNameInfo = MSVCRT$malloc(0x1000);
  126. objectName = *(PUNICODE_STRING) objectNameInfo;
  127. int procID = 0;
  128. if (flags == QUERY_PROC) procID = KERNEL32$GetProcessId(dupHandle);
  129. if (flags == QUERY_THREAD) procID = KERNEL32$GetProcessIdOfThread(dupHandle);
  130. char procNameTemp[MAX_PATH];
  131. if (procID != 0) {
  132. if (flags == QUERY_THREAD) {
  133. HANDLE pH = KERNEL32$OpenProcess(PROCESS_DUP_HANDLE | PROCESS_QUERY_INFORMATION, FALSE, procID);
  134. if (pH) KERNEL32$K32GetProcessImageFileNameA(pH, procNameTemp, MAX_PATH);
  135. else MSVCRT$sprintf_s(procNameTemp, MAX_PATH, "%s", "non existent?");
  136. KERNEL32$CloseHandle(pH);
  137. }
  138. else {
  139. KERNEL32$K32GetProcessImageFileNameA(dupHandle, procNameTemp, MAX_PATH);
  140. }
  141. }
  142. if (targetPid != 0 && targetPid != procID) {
  143. MSVCRT$free(objectTypeInfo);
  144. MSVCRT$free(objectNameInfo);
  145. KERNEL32$CloseHandle(dupHandle);
  146. continue;
  147. }
  148. if(procID != 0 && objHandle.UniqueProcessId != procID) {
  149. internal_printf("\nHandle from:\t%s [%d]\nHandle to:\t%s [%d]\nHandle object:\t%#x\nAccess rights:\t%#x\n",
  150. procHostName,
  151. KERNEL32$GetProcessId(processHandle),
  152. procNameTemp,
  153. procID,
  154. objHandle.HandleValue,
  155. objHandle.GrantedAccess); //https://learn.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights
  156. foundHandle = TRUE;
  157. }
  158. MSVCRT$free(objectTypeInfo);
  159. MSVCRT$free(objectNameInfo);
  160. KERNEL32$CloseHandle(dupHandle);
  161. }
  162. MSVCRT$free(handleInfo);
  163. KERNEL32$CloseHandle(processHandle);
  164. return foundHandle;
  165. }
  166. int go(char *args, int len) {
  167. int basePid = 0;
  168. int targetPid = 0;
  169. BYTE flags;
  170. CHAR *search;
  171. CHAR *query;
  172. BOOL res = NULL;
  173. datap parser;
  174. BeaconDataParse(&parser, args, len);
  175. search = BeaconDataExtract(&parser, NULL);
  176. query = BeaconDataExtract(&parser, NULL);
  177. if(!bofstart()) return;
  178. if (MSVCRT$strcmp(query, "proc") == 0) flags = QUERY_PROC;
  179. else if (MSVCRT$strcmp(query, "thread") == 0) flags = QUERY_THREAD;
  180. else {
  181. BeaconPrintf(CALLBACK_ERROR, "Please specify either proc (PROCESS_HANDLE) or 2 (THREAD_HANDLE) as handle search options.\n");
  182. return 0;
  183. }
  184. if (MSVCRT$strcmp(search, "all") == 0) {
  185. BeaconPrintf(CALLBACK_OUTPUT, "[*] Start enumerating all processes with handles to all other processes\n");
  186. res = GetHandles(0, flags, 0);
  187. }
  188. else if (MSVCRT$strcmp(search, "h2p") == 0) {
  189. targetPid = BeaconDataInt(&parser);
  190. BeaconPrintf(CALLBACK_OUTPUT, "[*] Start enumerating all processes that have a handle to PID: [%d]\n", targetPid);
  191. res = GetHandles(0, flags, targetPid);
  192. }
  193. else if (MSVCRT$strcmp(search, "p2h") == 0) {
  194. basePid = BeaconDataInt(&parser);
  195. BeaconPrintf(CALLBACK_OUTPUT, "[*] Start enumerating handles from PID [%d] to all other processes\n", basePid);
  196. res = GetHandles(basePid, flags, 0);
  197. }
  198. else {
  199. BeaconPrintf(CALLBACK_ERROR, "Please specify one of the following process search options: ht | h2p | p2h\n");
  200. return 0;
  201. }
  202. if(!res) BeaconPrintf(CALLBACK_ERROR, "No handle found for this search query!\n");
  203. else {
  204. printoutput(TRUE);
  205. }
  206. return 0;
  207. }