lem0nSec / ShellGhost

A memory-based evasion technique which makes shellcode invisible from process start to end.
GNU General Public License v3.0
1.13k stars 135 forks source link

Unable to get shell code execution. #4

Closed brucebatman closed 11 months ago

brucebatman commented 11 months ago

Hello lem0nSec, thank you for taking the time of making this tool

The current calc shellcode works, this one is provided by your examples, i have tried the following with no dice.

Payloads Tested:

Procedure:

Environment:

Again thanks for your help.

lem0nSec commented 11 months ago

Hi, thanks for opening an issue. Make sure you use a non-staged x64 reverse shell shellcode as payload. Also the script should be executed with the -4 parameter as well. Otherwise you won't be able to modify the header file accordingly.

brucebatman commented 11 months ago

@lem0nSec

Hello, i have tried the proposed solution, and unfortunately, i haven't got any connect back, so i decided to use your example, and change the executed command.

I just want to validate my steps, 1) msfvenom -p windows/x64/exec cmd=notepad.exe EXITFUNC=thread -e generic/none -f python 2) copy the output of the msfvenom command inside the ShellGhost_mapping.py 3) ShellGhost_mapping.py -1 or -4i have tried both. 4) Compile the Solution from VS 5) Execute the program

Result : Nothing, the ShellGhost binary still runs, but nothing happens. Again thanks for your help.