This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Read more
- Pentest Recon Tools
- Hack Tools Pc
- Hacker Tools Linux
- Black Hat Hacker Tools
- Tools For Hacker
- Pentest Tools Port Scanner
- Hacking Tools For Windows
- How To Hack
- Hacker Tools For Pc
- Pentest Tools Website Vulnerability
- Hacking Tools For Windows Free Download
- Pentest Tools Review
- Hak5 Tools
- Pentest Tools Website Vulnerability
- Hacker Tools 2019
- Hacking Tools For Windows Free Download
- Pentest Tools Nmap
- Blackhat Hacker Tools
- Hacker Tools For Windows
- How To Make Hacking Tools
- Hacking Tools Download
- Hacker Tools
- Pentest Tools Website
- World No 1 Hacker Software
- Game Hacking
- Pentest Tools Android
- Ethical Hacker Tools
- Pentest Tools Bluekeep
- Hacking Tools Github
- Pentest Recon Tools
- Hacking Tools Free Download
- Hacking Tools Windows
- Hacking Tools 2019
- Hacking Tools Pc
- Hack Apps
- Hacking Tools Name
- Underground Hacker Sites
- Tools Used For Hacking
- Hack Rom Tools
- Hacker Tools For Windows
- Hack App
- Hack Tools For Windows
- Pentest Tools Review
- Pentest Tools Find Subdomains
- Hacking Tools For Pc
- Hack Tools Download
- Hackrf Tools
- Pentest Tools Apk
- Hacker
- Hacking Tools For Kali Linux
- Nsa Hack Tools Download
- Computer Hacker
- Hacking Tools For Kali Linux
- Pentest Tools Github
- Hacking Tools For Windows Free Download
- Hacking Tools Windows 10
- Hacking Tools Hardware
- Hack Tools Online
- Pentest Tools Open Source
- Hacks And Tools
- Hack Tools Online
- Pentest Reporting Tools
- Hacking Tools
- Github Hacking Tools
- Pentest Tools Review
- Pentest Tools Alternative
- Hacking Tools Hardware
- Hacker Tools Online
- Install Pentest Tools Ubuntu
- Hacking Tools Free Download
- Hack Website Online Tool
- Pentest Tools Open Source
- Bluetooth Hacking Tools Kali
- Pentest Automation Tools
- Hacking Tools For Kali Linux
- Hacker Search Tools
- Pentest Tools Open Source
- Hackers Toolbox
- Pentest Automation Tools
- Github Hacking Tools
- Hacker Tools For Mac
- Hack Apps
- Hacking Tools For Pc
- Pentest Tools Subdomain
- Best Hacking Tools 2020
- Hacking Tools Windows
- Hackers Toolbox
- Wifi Hacker Tools For Windows
- Hacker Tools Free Download
- Hacking Tools For Windows
- Pentest Tools Port Scanner
- Hack Tool Apk No Root
- Hacking Tools For Kali Linux
- Hack Tool Apk No Root
- Hacker Techniques Tools And Incident Handling
- Pentest Tools For Android
- Hacking Tools 2020
- Hacking Apps
- Hack Tools For Windows
- Pentest Tools Kali Linux
- Hacker Tools Apk
- Ethical Hacker Tools
- Hacking Tools Windows
- Best Pentesting Tools 2018
- Pentest Tools For Windows
- Hacker Tools For Pc
No comments:
Post a Comment