This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related posts
- Hacker Tools Online
- Easy Hack Tools
- Easy Hack Tools
- Hacking Tools Kit
- Hack Tools Pc
- Hack Tool Apk
- Hacker Tools 2020
- Black Hat Hacker Tools
- Hacking Tools For Windows Free Download
- How To Install Pentest Tools In Ubuntu
- Easy Hack Tools
- Underground Hacker Sites
- Hacking Tools 2019
- Hacker Tools For Pc
- Hak5 Tools
- Hacker Tools Online
- Install Pentest Tools Ubuntu
- Hacker Tools Free Download
- Best Hacking Tools 2020
- Hacking Tools For Games
- Hacking Tools For Beginners
- Pentest Tools For Android
- Pentest Box Tools Download
- Black Hat Hacker Tools
- Free Pentest Tools For Windows
- Hacker Tools Hardware
- Best Hacking Tools 2019
- New Hack Tools
- Hack Tools For Pc
- World No 1 Hacker Software
- Hacking Tools Windows 10
- Hack Tools Pc
- Pentest Tools Open Source
- Black Hat Hacker Tools
- Pentest Tools Url Fuzzer
- Tools Used For Hacking
- Hack Rom Tools
- How To Make Hacking Tools
- Hacker Tools Linux
- Hacking Tools For Windows Free Download
- Hacking Tools Download
- Hacking App
- Hacker
- Hacker Hardware Tools
- Pentest Tools Url Fuzzer
- Hacker Tools Free
- Github Hacking Tools
- Nsa Hack Tools Download
- Hack Tools Online
- Pentest Tools Url Fuzzer
- Pentest Tools Website
- Pentest Tools For Ubuntu
- Pentest Tools Nmap
- Pentest Tools Alternative
- Hack App
- Pentest Tools Online
- New Hacker Tools
- Nsa Hacker Tools
- Hak5 Tools
- Hacking Tools Kit
- Bluetooth Hacking Tools Kali
- Install Pentest Tools Ubuntu
- Pentest Tools Open Source
- Hack Tools Online
- Hacker Hardware Tools
- Blackhat Hacker Tools
- Hack Tools 2019
- New Hacker Tools
- Hacking Tools For Windows Free Download
- Hacker Tools 2019
- Pentest Tools Free
- Hacker Tools For Mac
- Pentest Tools Bluekeep
- Pentest Tools Kali Linux
- Hacking Tools Name
- Hacking Tools Windows
0 comentários:
Postar um comentário