This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Read more
- Underground Hacker Sites
- Hacking Tools For Beginners
- Pentest Tools Android
- Hack Tool Apk No Root
- Pentest Tools For Mac
- Growth Hacker Tools
- Hack Tools Download
- Hacker Hardware Tools
- Bluetooth Hacking Tools Kali
- What Are Hacking Tools
- Hacker
- Usb Pentest Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Find Subdomains
- Hacker Tools Free Download
- Game Hacking
- Hacker Tools Apk
- Pentest Tools List
- New Hacker Tools
- Hacking Tools Windows 10
- Hacking Tools Kit
- Hacker Tools
- Pentest Box Tools Download
- Hacker Tools For Windows
- Pentest Tools Windows
- Hacker Tools For Windows
- Hacking Tools Free Download
- Hacker Security Tools
- Install Pentest Tools Ubuntu
- Hacker Tools For Pc
- New Hacker Tools
- Hacker Search Tools
- Pentest Tools Free
- Hacking Tools Pc
- Kik Hack Tools
- Hack Tool Apk
- Hack Tools
- Pentest Tools Website Vulnerability
- Pentest Recon Tools
- Hackers Toolbox
- Pentest Automation Tools
- Hacking Tools Kit
- Tools 4 Hack
- Hack Tools 2019
- Pentest Tools For Mac
- Blackhat Hacker Tools
- Wifi Hacker Tools For Windows
- Hacker Tools Mac
- Underground Hacker Sites
- Pentest Tools Open Source
- Top Pentest Tools
- Hacker Tools 2020
- Hacker Search Tools
- Physical Pentest Tools
- Blackhat Hacker Tools
- Pentest Tools List
- Termux Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Tools For Hacker
- Hacking Tools Name
- Hack Tools Github
- Pentest Tools Framework
- Hacking Tools Software
- Nsa Hack Tools
- Hacking Tools Windows 10
- Hacker Tools Software
- Hack Tools For Games
- Hacking Tools Online
- Hack Tool Apk No Root
- Hak5 Tools
- Pentest Tools
- Pentest Tools Bluekeep
- Blackhat Hacker Tools
- Black Hat Hacker Tools
- Hacker Tools Free Download
- Hack Tool Apk
- Hak5 Tools
- Hack Website Online Tool
- Hacking Tools And Software
- Pentest Automation Tools
- Black Hat Hacker Tools
- Hack Tools For Ubuntu
- Hacking Tools Software
- Growth Hacker Tools
- Pentest Tools Framework
- Pentest Tools Apk
- Pentest Tools For Windows
- Hacking Tools Usb
- Pentest Tools Free
- What Are Hacking Tools
- Hacking Tools Download
- Growth Hacker Tools
- Termux Hacking Tools 2019
- Hacking Tools Usb
- Hacking Tools Mac
- Hacking Tools
- Hacking Tools Online
- Hacking Tools For Kali Linux
- Hack Tools Mac
- Hack Website Online Tool
- Hacking Tools For Windows
- World No 1 Hacker Software
- Hacking Tools Free Download
- Hack Tools
- Black Hat Hacker Tools
- Hacker Tools Online
- Hacking Tools Hardware
- Hacker Tools Windows
- Usb Pentest Tools
- Pentest Tools Port Scanner
- What Is Hacking Tools
- Hack Tools For Mac
- Hacker Tools List
- Hacking App
- Hacking Tools 2019
- New Hack Tools
- Hack Tools Download
- Pentest Tools For Android
- Pentest Tools Website
- Hacking Tools Free Download
- Top Pentest Tools
- Hack Tools For Games
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free Download
- Pentest Tools Kali Linux
- Nsa Hacker Tools
- Best Hacking Tools 2020
- Hacker Tools
- Hacker Tools For Pc
- Android Hack Tools Github
- Game Hacking
- Pentest Tools Framework
- Hacking Tools Windows
- What Are Hacking Tools
- Pentest Tools Website Vulnerability
- Hack Tools Mac
No comments:
Post a Comment