-
-
Notifications
You must be signed in to change notification settings - Fork 3
/
HOWTO.txt
45 lines (42 loc) · 1.17 KB
/
HOWTO.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1. Look for target application pid
2. Use injector.exe to load ManagedLoader to target process
3. Use ManagedLoader to load Ishtar:
3a. Load ObjectUtils.dll from Ishtar dir
3b. Load Microsoft.Diagnostics.Runtime from Ishtar dir
3c. Load Ishtar.exe from Ishatr dir
4d. Execute Ishtar:
* Assemby: Ishtar
* Type: Ishtar.Program
* Method: LoadIshtar
4. Add Ishtar path to sys:
'''
import sys
sys.path.append(r'x:\path\to\python\lib')
sys.path.append(r'x:\path\to\ishtar')
'''
5. Import ishtar python script
'''
from scripts import ishtar
'''
6. Run VMMAP
vmmap.exe -p<pid> <outputfile.csv>
7. Load managed heaps map to Ishtar:
'''
ishtar.parse_vmmap_file('outputfile.csv')
'''
8. Load clr module
'''
import clr
clr.AddReference('System')
import System
'''
9. Look for MT for given object
'''
name = System.String('ishtar')
name_ptr = Objects.GetObjectAddress(name)
name_mt = Objects.GetMTAddress(name_ptr)
name_type = Objects.GetTypeByName('System.String')
'''
10. Find objects on heaps, that have the same MT address (are of the same type)
'''
'''