Summary
Retrieve a list of available injection techniques the agent can use.Usage
Detailed Summary
Theget_injection_techniques command displays the various process injection techniques the agent is capable of using for post-exploitation jobs. You can see the current technique being used by an agent with the get_injection_techniques command. The technique can also be changed using the set_injection_technique command.
You are encouraged to create your own injection technique and submit a new pull request!
Available techniques
CreateRemoteThread
“Classic” process injection technique that uses theVirtualAllocEx, WriteProcessMemory and CreateRemoteThread Windows APIs to execute shellcode in a specified process.
Early-Bird QueueUserAPC
Works for all jobs spawning sacrificial processes, but mileage may vary for injection-type commands. CallsVirtualAllocEx, WriteProcessMemory, QueueUserAPC and ResumeThread calls.
NtCreateThreadEx
Leverages syscalls from the NTDLL library to directly invoke shellcode associated withNtOpenProcess, NtClose, NtDuplicateObject, NtAllocateVirtualMemory, NtProtectVirtualMemory, NtWriteVirtualMemory, and NtCreateThreadEx
