Merge branch 'master' of github.com:mgeeky/Penetration-Testing-Tools

This commit is contained in:
mgeeky 2022-02-17 12:39:07 +01:00
commit b9444d4170
4 changed files with 13 additions and 5 deletions

@ -1 +1 @@
Subproject commit 7d3c3b5991cb430d6ff9c66c794688d67d5baa75 Subproject commit 9fa37bcfe59b9431f2444b049d9103d8e755a493

View File

@ -8,6 +8,8 @@
* Tested on Palo Alto Networks: * Tested on Palo Alto Networks:
* GlobalProtect client 3.1.6.19 (x64) * GlobalProtect client 3.1.6.19 (x64)
* GlobalProtect client 5.0.3.29 (x64) * GlobalProtect client 5.0.3.29 (x64)
* GlobalProtect client 5.1.3.12 (x64)
* GlobalProtect client 5.2.8.23 (x64)
* *
* Compilation: * Compilation:
* C:> g++ GlobalProtectDisable.cpp -o GlobalProtectDisable.exe -static -static-libgcc -static-libstdc++ * C:> g++ GlobalProtectDisable.cpp -o GlobalProtectDisable.exe -static -static-libgcc -static-libstdc++
@ -22,14 +24,13 @@
using namespace std; using namespace std;
const wchar_t *processName = L"PanGPA.exe"; const size_t PatternsNum = 4;
const size_t PatternsNum = 3;
const size_t SizeOfReplacingBytes = 2;
const wchar_t *versionsArray[PatternsNum] = { const wchar_t *versionsArray[PatternsNum] = {
L"3.1.6.19", L"3.1.6.19",
L"5.0.3.29", L"5.0.3.29",
L"5.1.3.12" L"5.1.3.12",
L"5.2.8.23",
}; };
// //
@ -84,6 +85,8 @@ const BYTE patternToFind51312[] = {
0x00, 0x00, 0x00, 0x85, 0xD2 0x00, 0x00, 0x00, 0x85, 0xD2
}; };
const wchar_t *processName = L"PanGPA.exe";
const size_t SizeOfReplacingBytes = 2;
// jne pangpa.7FF621B7D08F // jne pangpa.7FF621B7D08F
const BYTE bytesToBeReplaced31619[SizeOfReplacingBytes] = { const BYTE bytesToBeReplaced31619[SizeOfReplacingBytes] = {
@ -119,24 +122,28 @@ const BYTE replacingBytes51312[SizeOfReplacingBytes] = {
const BYTE *patternsArray[PatternsNum] = { const BYTE *patternsArray[PatternsNum] = {
patternToFind31619, patternToFind31619,
patternToFind50329, patternToFind50329,
patternToFind51312,
patternToFind51312 patternToFind51312
}; };
const size_t patternsSizes[PatternsNum] = { const size_t patternsSizes[PatternsNum] = {
sizeof(patternToFind31619), sizeof(patternToFind31619),
sizeof(patternToFind50329), sizeof(patternToFind50329),
sizeof(patternToFind51312),
sizeof(patternToFind51312) sizeof(patternToFind51312)
}; };
const BYTE *patternsToBeReplaced[PatternsNum] = { const BYTE *patternsToBeReplaced[PatternsNum] = {
bytesToBeReplaced31619, bytesToBeReplaced31619,
bytesToBeReplaced50329, bytesToBeReplaced50329,
bytesToBeReplaced51312,
bytesToBeReplaced51312 bytesToBeReplaced51312
}; };
const BYTE *replacingBytes[PatternsNum] = { const BYTE *replacingBytes[PatternsNum] = {
replacingBytes31619, replacingBytes31619,
replacingBytes50329, replacingBytes50329,
replacingBytes51312,
replacingBytes51312 replacingBytes51312
}; };

Binary file not shown.

View File

@ -83,6 +83,7 @@ cmd> py findSymbols.py "c:\Program Files\Microsoft Office" -e -r -u -s exec -s l
- 3.1.6.19 - 3.1.6.19
- 5.0.3.29 - 5.0.3.29
- 5.1.3.12 - 5.1.3.12
- 5.2.8.23
Steps are following: Steps are following: