Ashish Sharma, Paras Chugh, Rohan Aggarwal, Harshit Garg
{"title":"使用套接字编程的Shell挖掘","authors":"Ashish Sharma, Paras Chugh, Rohan Aggarwal, Harshit Garg","doi":"10.1109/ICIERA53202.2021.9726756","DOIUrl":null,"url":null,"abstract":"This research aims to modify the existing shell shoveling technique to gain persistent control over a target's windows system without the knowledge of the compromised user. A .exe file is executed on the target system, which initiates a connection with the server system using socket programming, giving it full control over the target system's command line. In the conventional shell shoveling technique, the connection would've been broken had the target either deleted the file or restarted his/her system. To overcome the former issue, we made sure that a separate copy of our .exe file is made in the AppData folder during the first execution of the .exe file. For the latter issue, a registry entry is made at ‘HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run’ so the file would automatically get executed every time the system is started.","PeriodicalId":220461,"journal":{"name":"2021 International Conference on Industrial Electronics Research and Applications (ICIERA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Shell Shoveling Using Socket Programming\",\"authors\":\"Ashish Sharma, Paras Chugh, Rohan Aggarwal, Harshit Garg\",\"doi\":\"10.1109/ICIERA53202.2021.9726756\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research aims to modify the existing shell shoveling technique to gain persistent control over a target's windows system without the knowledge of the compromised user. A .exe file is executed on the target system, which initiates a connection with the server system using socket programming, giving it full control over the target system's command line. In the conventional shell shoveling technique, the connection would've been broken had the target either deleted the file or restarted his/her system. To overcome the former issue, we made sure that a separate copy of our .exe file is made in the AppData folder during the first execution of the .exe file. For the latter issue, a registry entry is made at ‘HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run’ so the file would automatically get executed every time the system is started.\",\"PeriodicalId\":220461,\"journal\":{\"name\":\"2021 International Conference on Industrial Electronics Research and Applications (ICIERA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Industrial Electronics Research and Applications (ICIERA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIERA53202.2021.9726756\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Industrial Electronics Research and Applications (ICIERA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIERA53202.2021.9726756","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This research aims to modify the existing shell shoveling technique to gain persistent control over a target's windows system without the knowledge of the compromised user. A .exe file is executed on the target system, which initiates a connection with the server system using socket programming, giving it full control over the target system's command line. In the conventional shell shoveling technique, the connection would've been broken had the target either deleted the file or restarted his/her system. To overcome the former issue, we made sure that a separate copy of our .exe file is made in the AppData folder during the first execution of the .exe file. For the latter issue, a registry entry is made at ‘HKCU\Software\Microsoft\Windows\CurrentVersion\Run’ so the file would automatically get executed every time the system is started.