pipetap a Windows named pipe proxy tool #1644
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
pipetap is a Windows named pipe proxy and analysis tool aimed at reverse engineering and exploiting named-pipe–based IPC, especially where a privileged service exposes a pipe to less‑privileged clients. It focuses on live interception, inspection, and modification of named pipe traffic, and on working around pipe hardening mechanisms such as PID-based client validation.
Architecture & Hooking Model
At its core, pipetap is a proxy that operat...
🔧 Technical Details
API Hooking to Intercept and Modify Named Pipe IPC
Inject a DLL into a Windows process that uses named pipes and hook low-level I/O APIs such as
ReadFileandWriteFile(and variants) for pipe handles, using an inline hooking framework like Microsoft Detours. For each call, copy the buffer and metadata, send them to a controller (e.g., via a control pipe), optionally modify them, then invoke the original API. This turns arbitrary named-pipe traffic into an inspectable and editable stream, enabling protocol reverse engineering, triggering edge cases, and exploring attack surfaces such as unsafe deserialization or command injection in privileged services.Bypassing PID-Based Named Pipe Client Validation via Remote Client Execution
When a named pipe server validates clients by querying the connecting process’s PID and inspecting attributes (code signature, image path, etc.), an external tool’s direct conn...
🤖 Agent Actions
Summary:
windows-local-privilege-escalation/named-pipe-client-impersonation.mdwith a new “Named Pipe IPC Abuse & MITM (DLL Injection, API Hooking, PID Validation Bypass)” section that distills the pipetap workflow. The section covers inline Detours-based hooking ofReadFile/WriteFile, operating the control channel to edit/drop payloads, leveraging remote client mode to bypass PID-based validation, systematic enumeration/probing viapipelistand the message composer, and the TCP→pipe bridge plus Python SDK for automation/fuzzing.Tests: Not run (documentation-only changes).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.