Awesome
RPC Forge
RPC Forge is a local Python fuzzer of Windows RPC interfaces available over ALPC.
The fuzzer parses the interfaces definitions and automatically performs valid calls on the RPC methods.
This is more a PoC than a real fuzzer. Its aim was to be able to forge a valid serialized stream reaching RPC methods code without being rejected by the Windows RPC Runtime (because of bad arguments type leading to error: RPC_X_BAD_STUB_DATA).
Thus, it doesn't contain any instrumentation in the server side to improve code coverage.
RPC Forge was part of our work on Windows RPC and was introduced at PacSec 2017: A view into ALPC-RPC.
Internal working
- Select one random interface
- Connect and bind to it through epmapper RPC service or fixed ALPC endpoint name (see Usage)
- Randomly choose one method
- Generate valid call arguments according to the method parameters types based on Sulley Generator
- Save the logs (call information) in a local file (depends on config.py)
- Perform the call with marshaled (NDR) generated arguments
- Extract any context_handle from the returned stream (to forge calls expecting a valid context_handle)
- Loop (Step 1 or Step 3)
Deps
PythonForWindows providing a Python implementation to play with ALPC and RPC.
Usage
The custom RPCView decompiler to generate Python definitions of interfaces won't be provided.
Five examples of Windows 10 interfaces are available in interfaces directory.
# Describe the RPC interface and methods in Python
from rpc_forge import *
# Interface UUID 552d076a-cb29-4e44-8b6a-d15e59e2c0af VERSION 1.0 (DLL iphlpsvc.dll)
interface = Interface("552d076a-cb29-4e44-8b6a-d15e59e2c0af", (1,0), [
# Method number 0 "IpTransitionProtocolApplyConfigChanges"
# * has an implicit binding handle (n_first_arg=1)
# * take one parameter: [in]char arg_1
Method("IpTransitionProtocolApplyConfigChanges", 1, In(NdrByte)),
# Method number 1 "IpTransitionProtocolApplyConfigChangesEx"
# * has an implicit binding handle (n_first_arg=1)
# * take three parameters:
# [in]char arg_1,
# [in][range(0,65535)] long arg_2,
# [in][size_is(arg_2)] byte *arg_3
Method("IpTransitionProtocolApplyConfigChangesEx", 1,
In(NdrByte),
In(Range(0,65535) / NdrLong),
In(SizeIs(2) / NdrCString)
),
])
# Fuzzer will try to connect using epmapper service
interface.is_registered = True
# Fuzzer will also try the ALPC endpoint \RPC Control\TeredoDiagnostics
interface.endpoints = ["TeredoDiagnostics"]
Thanks
RPCView for interface IDL decompilation
Author
- Mastho