Skip to content

A method to execute shellcode using RegisterWaitForInputIdle API.

Notifications You must be signed in to change notification settings

RixedLabs/IDLE-Abuse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

IDLE-Abuse

Alt text

IDLE Abuse :A simple technique to detect when a Windows process becomes idle and inject malicious code into it. This technique relies on an undocumented Windows API function called RegisterWaitForInputIdle, which allows a callback function to be registered and called when a process becomes idle.

The PoC, written by Navneet Raj and ElementalX , demonstrates the use of this technique by registering a callback function that injects a meterpreter shellcode into the Windows calculator process when the process spawned by WinExec function becomes idle. Thanks to folks at Stack Overflow & REACT OS Source code for showing us the correct direction.

Special thanks to modexp for helping us with the code overview.

About

A method to execute shellcode using RegisterWaitForInputIdle API.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages