2016-04-05 06:52:26 +03:00
|
|
|
#include <unicorn/unicorn.h>
|
2017-01-22 17:05:08 +03:00
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
2021-10-29 13:44:49 +03:00
|
|
|
int syscall_abi[] = {UC_X86_REG_RAX, UC_X86_REG_RDI, UC_X86_REG_RSI,
|
|
|
|
UC_X86_REG_RDX, UC_X86_REG_R10, UC_X86_REG_R8,
|
|
|
|
UC_X86_REG_R9};
|
2016-04-05 06:52:26 +03:00
|
|
|
|
2021-10-29 13:44:49 +03:00
|
|
|
uint64_t vals[7] = {200, 10, 11, 12, 13, 14, 15};
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2021-10-29 13:44:49 +03:00
|
|
|
// This part of the API is less... clean... because Unicorn supports arbitrary
|
|
|
|
// register types. So the least intrusive solution is passing individual
|
|
|
|
// pointers. On the plus side, you only need to make this pointer array once.
|
2016-04-05 06:52:26 +03:00
|
|
|
void *ptrs[7];
|
|
|
|
|
2016-04-06 04:48:38 +03:00
|
|
|
void uc_perror(const char *func, uc_err err)
|
|
|
|
{
|
2016-04-05 06:52:26 +03:00
|
|
|
fprintf(stderr, "Error in %s(): %s\n", func, uc_strerror(err));
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BASE 0x10000
|
|
|
|
|
2021-10-29 13:44:49 +03:00
|
|
|
// mov rax, 100; mov rdi, 1; mov rsi, 2; mov rdx, 3; mov r10, 4; mov r8, 5; mov
|
|
|
|
// r9, 6; syscall
|
|
|
|
#define CODE \
|
|
|
|
"\x48\xc7\xc0\x64\x00\x00\x00\x48\xc7\xc7\x01\x00\x00\x00\x48\xc7\xc6\x02" \
|
|
|
|
"\x00\x00\x00\x48\xc7\xc2\x03\x00\x00\x00\x49\xc7\xc2\x04\x00\x00\x00\x49" \
|
|
|
|
"\xc7\xc0\x05\x00\x00\x00\x49\xc7\xc1\x06\x00\x00\x00\x0f\x05"
|
2016-04-05 06:52:26 +03:00
|
|
|
|
2016-04-06 04:48:38 +03:00
|
|
|
void hook_syscall(uc_engine *uc, void *user_data)
|
|
|
|
{
|
2016-04-05 06:52:26 +03:00
|
|
|
int i;
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
uc_reg_read_batch(uc, syscall_abi, ptrs, 7);
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
printf("syscall: {");
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
for (i = 0; i < 7; i++) {
|
2021-10-29 13:44:49 +03:00
|
|
|
if (i != 0)
|
|
|
|
printf(", ");
|
2016-04-18 07:54:21 +03:00
|
|
|
printf("%" PRIu64, vals[i]);
|
2016-04-05 06:52:26 +03:00
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
printf("}\n");
|
|
|
|
}
|
|
|
|
|
2016-04-06 04:48:38 +03:00
|
|
|
void hook_code(uc_engine *uc, uint64_t addr, uint32_t size, void *user_data)
|
|
|
|
{
|
2016-04-18 07:54:21 +03:00
|
|
|
printf("HOOK_CODE: 0x%" PRIx64 ", 0x%x\n", addr, size);
|
2016-04-05 06:52:26 +03:00
|
|
|
}
|
|
|
|
|
2023-10-08 14:39:13 +03:00
|
|
|
int main(void)
|
2016-04-06 04:48:38 +03:00
|
|
|
{
|
2016-04-05 06:52:26 +03:00
|
|
|
int i;
|
2016-04-06 04:48:38 +03:00
|
|
|
uc_hook sys_hook;
|
|
|
|
uc_err err;
|
|
|
|
uc_engine *uc;
|
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
// set up register pointers
|
|
|
|
for (i = 0; i < 7; i++) {
|
|
|
|
ptrs[i] = &vals[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = uc_open(UC_ARCH_X86, UC_MODE_64, &uc))) {
|
|
|
|
uc_perror("uc_open", err);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// reg_write_batch
|
|
|
|
printf("reg_write_batch({200, 10, 11, 12, 13, 14, 15})\n");
|
|
|
|
if ((err = uc_reg_write_batch(uc, syscall_abi, ptrs, 7))) {
|
|
|
|
uc_perror("uc_reg_write_batch", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
// reg_read_batch
|
|
|
|
memset(vals, 0, sizeof(vals));
|
|
|
|
if ((err = uc_reg_read_batch(uc, syscall_abi, ptrs, 7))) {
|
|
|
|
uc_perror("uc_reg_read_batch", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
printf("reg_read_batch = {");
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
for (i = 0; i < 7; i++) {
|
2021-10-29 13:44:49 +03:00
|
|
|
if (i != 0)
|
|
|
|
printf(", ");
|
2016-04-18 07:54:21 +03:00
|
|
|
printf("%" PRIu64, vals[i]);
|
2016-04-05 06:52:26 +03:00
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
printf("}\n");
|
|
|
|
|
|
|
|
// syscall
|
|
|
|
printf("\n");
|
|
|
|
printf("running syscall shellcode\n");
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2021-10-29 13:44:49 +03:00
|
|
|
if ((err = uc_hook_add(uc, &sys_hook, UC_HOOK_INSN, hook_syscall, NULL, 1,
|
|
|
|
0, UC_X86_INS_SYSCALL))) {
|
2016-04-05 06:52:26 +03:00
|
|
|
uc_perror("uc_hook_add", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
if ((err = uc_mem_map(uc, BASE, 0x1000, UC_PROT_ALL))) {
|
|
|
|
uc_perror("uc_mem_map", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
if ((err = uc_mem_write(uc, BASE, CODE, sizeof(CODE) - 1))) {
|
|
|
|
uc_perror("uc_mem_write", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2016-04-05 06:52:26 +03:00
|
|
|
if ((err = uc_emu_start(uc, BASE, BASE + sizeof(CODE) - 1, 0, 0))) {
|
|
|
|
uc_perror("uc_emu_start", err);
|
|
|
|
return 1;
|
|
|
|
}
|
2016-04-06 04:48:38 +03:00
|
|
|
|
2021-10-03 17:14:44 +03:00
|
|
|
uc_close(uc);
|
2016-04-06 04:48:38 +03:00
|
|
|
return 0;
|
2016-04-05 06:52:26 +03:00
|
|
|
}
|