C0000005, EXCEPTION_ACCESS_VIOLATION
Hello, first of all, thanks for sharing this interesting project.
I generated a binary like this:
python3 Boaz.py -f ../payload.bin -t donut -l 1 -c mingw -e uuid -g
Upon reaching the shellcode, I get this error:
Changing the rights of the memory section from
to
during running the binary solves the problem - the shellcode fires. The rights of the memory section have to be set to execute/read/write after writing the shellcode to that section.
I wonder if anybody else has this problem since it doesn't look like a personal issue. Please check. Thank you.
The loader 1 is essentially a classic process injection called by custom syscall stubs. As shown in the screenshot, in NtAllocVirtualMemory call, it changes the memory protection to RWX therefore it should be RWX not R only.
Thanks for your answer. I really wonder why the memory protection is R only in my binary.