This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Read more
- Hacker Hardware Tools
- Underground Hacker Sites
- Hacking Tools For Kali Linux
- Pentest Tools Find Subdomains
- Hacking Tools For Windows 7
- Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Hacking Tools Pc
- Pentest Box Tools Download
- Hacking Tools 2020
- Beginner Hacker Tools
- Pentest Tools Nmap
- Hacker Tools 2020
- Pentest Tools Website
- Easy Hack Tools
- Best Hacking Tools 2020
- Hacking Tools Kit
- Hacker Tools Free Download
- How To Hack
- Pentest Tools List
- Pentest Tools Linux
- Top Pentest Tools
- Hacker Tools Free
- Hacking Tools Download
- Hak5 Tools
- Black Hat Hacker Tools
- Hacker Tools Online
- Pentest Tools Github
- Hacker Tools Free
- Hack Tool Apk No Root
- Top Pentest Tools
- What Are Hacking Tools
- Hack Rom Tools
- Tools 4 Hack
- Best Pentesting Tools 2018
- Hack Tools Online
- Hack Tools For Mac
- Pentest Tools Alternative
- Hacking Tools Name
- Nsa Hacker Tools
- Hack Apps
- Hack Tools Mac
- Hacking Tools Name
- Github Hacking Tools
- Pentest Tools Website Vulnerability
- Hack Tools For Mac
- Pentest Tools Github
- What Is Hacking Tools
- Pentest Tools Free
- Hacker Search Tools
- Pentest Reporting Tools
- Hacking Tools
- Hacks And Tools
- Hacker Tools List
- What Are Hacking Tools
- Hacking Tools Windows 10
- Blackhat Hacker Tools
- Hack Tools For Windows
- Hacker Tools Software
- Free Pentest Tools For Windows
- Hacker Tools Free Download
- Github Hacking Tools
- What Are Hacking Tools
- Hacking Tools Free Download
- Pentest Tools Github
- Hacker Tools Free Download
- Underground Hacker Sites
- Hacking Tools Usb
- Hacking Tools 2020
- Hacker Tool Kit
- Hacking Tools For Windows
- Hacking App
- Pentest Tools Port Scanner
- Pentest Box Tools Download
- Pentest Tools Url Fuzzer
- Hacker Tools For Pc
- Hak5 Tools
- Hacker Tools List
- Pentest Tools Subdomain
- Ethical Hacker Tools
- Hacker Tools For Ios
- Hacker Tools Apk Download
- Hacker Tools 2019
- Hacking App
- Hacker Security Tools
- Hacker Tools 2019
No comments:
Post a Comment