Files
metasploit-gs/lib/msf/core/payload/macho.rb
T
2024-01-06 15:54:49 -05:00

93 lines
3.1 KiB
Ruby

# -*- coding: binary -*-
require 'macho'
require 'digest'
class Msf::Payload::MachO
def initialize(data)
@macho = MachO::MachOFile.new_from_bin(data)
end
def entrypoint
main_func = @macho[:LC_MAIN].first
main_func.entryoff
end
#
# Return the VM representation of a macho file
#
def flatten
raw_data = @macho.serialize
min = -1
max = 0
for segment in @macho.segments
next if segment.segname == MachO::LoadCommands::SEGMENT_NAMES[:SEG_PAGEZERO]
if min == -1 or min > segment.vmaddr
min = segment.vmaddr
end
if max < segment.vmaddr + segment.vmsize
max = segment.vmaddr + segment.vmsize
end
end
output_data = "\x00" * (max - min)
for segment in @macho.segments
for section in segment.sections
flat_addr = section.addr - min
section_data = raw_data[section.offset, section.size]
if section_data
output_data[flat_addr, section_data.size] = section_data
end
end
end
output_data
end
def to_dylib(name)
new_lc = MachO::LoadCommands::LoadCommand.create(:LC_ID_DYLIB, "@executable_path/#{name}.dylib", 0, 0, 0)
@macho.add_command(new_lc)
raw_data = @macho.serialize
raw_data[12] = MachO::Headers::MH_DYLIB.chr
raw_data[36,7] = "__ZERO\x00"
raw_data
end
# See: https://github.com/apple-oss-distributions/libsecurity_codesigning/blob/main/lib/signer.cpp#L179
# See: https://github.com/indygreg/apple-platform-rs/blob/main/apple-codesign/src/code_directory.rs
# See: https://developer.apple.com/forums/thread/702351
# See: https://github.com/apple-oss-distributions/Security/blob/e4ea024c9bbd3bfda30ec6df270bfb4c7438d1a9/SecurityTool/sharedTool/codesign.c#L323
def sign
raw_data = @macho.serialize
code_signature_index = @macho[:LC_CODE_SIGNATURE][0].dataoff
code_signature = raw_data[code_signature_index..]
s_magic, s_length, s_count, code_indexes = code_signature.unpack("N3a*")
raise "Invalid kSecCodeMagicEmbeddedSignature magic for macho" if s_magic != 0xfade0cc0
indexes = code_indexes.unpack("N#{s_count*2}a*")
code_directory = indexes.pop
magic, length, version, flags, hash_offset, ident_offset, n_special_slots, n_code_slots, code_limit, hash_size, hash_type, platform, page_size, spare2, hash_list = code_directory.unpack("N9C4Na*")
raise "Invalid kSecCodeMagicCodeDirectory magic for macho" if magic != 0xfade0c02
pagesize = 2**page_size
page_index = 0
raw_data.bytes.each_slice(pagesize) do |page|
break if page_index >= (length-hash_offset)/(hash_size)
if (page_index+1)*pagesize > code_signature_index
page = page[0..(pagesize-((page_index+1)*pagesize-code_signature_index))-1]
end
new_digest = Digest::SHA256.digest(page.pack("C*"))
old_digest_index = code_signature.index(code_directory[hash_offset+(hash_size*page_index)...])
code_signature[old_digest_index..old_digest_index+hash_size-1] = new_digest
page_index += 1
end
raw_data[code_signature_index..] = code_signature
raw_data
end
def raw
@macho.serialize
end
end