07-25-2024, 08:10 PM
Goffloader is a library that allows easy in-memory execution of Cobalt Strike BOFs and unmanaged PE files.
Given that there's already a number of very excellent C implementations of this functionality, why do this in Go?
Quote:Adding BOF loading to Go expands the number of open source security projects that can be used within Go security tooling. There are entire repositories of useful functionality that are now accessible for Go tools via this library.
While you can technically just use a C implementation of COFF loaders (Sliver does this, for example), CGO is annoying.
Go is a nice language for static signature evasion. You can see an example of us being able to run an embedded version of mimikatz without jumping through too many hoops.
Limitations
Quote:Currently the COFFLoader implementation is only for x64 architecture. 32-bit support will be coming soon.
At the moment the PE execution is just loading a BOF with hard-coded arguments - eventually a few different approaches will be supported.
The Beacon* API implementation is partial - most BOFs don't use much beyond the arg parsing + output functions, but there's a chunk of beacon.h which still needs to be implemented. This will be done as useful BOFs are identified that rely on these APIs.
Using this library in its current state will NOT generate a 0/N detections file on VT. Right now it's 2 or 3 detections from the usual offender false+ mills, but users should be aware of this.