Skip to content

Latest commit

 

History

History
11 lines (7 loc) · 684 Bytes

README.md

File metadata and controls

11 lines (7 loc) · 684 Bytes

WSAAcceptBackdoor

This project is a POC implementation for a DLL implant that acts as a backdoor for accept Winsock API calls. Once the DLL is injected into the target process, every accept call is intercepted using the Microsoft's detour library and redirected into the BackdooredAccept function. When a socket connection with a pre-defined special source port is establised, BackdooredAccept function launches a cmd.exe process and binds the accepted socket to the process STD(OUT/IN) using a named pipe.


Demo: TTMO-4