This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hackrf Tools
- Hacker Hardware Tools
- Easy Hack Tools
- Nsa Hack Tools Download
- Nsa Hack Tools
- Pentest Tools Github
- Hacking Tools For Games
- Pentest Tools Review
- Hacker Tools Hardware
- Pentest Tools For Android
- Best Hacking Tools 2020
- Hacking Tools Hardware
- Hacking Tools Pc
- World No 1 Hacker Software
- Pentest Reporting Tools
- Usb Pentest Tools
- Hacker Tools Github
- Pentest Tools For Windows
- Pentest Tools Nmap
- Pentest Tools Website
- New Hack Tools
- Ethical Hacker Tools
- Hackers Toolbox
- Hack Tools
- What Is Hacking Tools
- Hack And Tools
- Pentest Tools Review
- Computer Hacker
- Pentest Tools Online
- Hacking Tools Mac
- Hacker Tools For Ios
- Pentest Tools Apk
- Hacker Tools Windows
- Pentest Tools Kali Linux
- Termux Hacking Tools 2019
- Pentest Tools Kali Linux
- Pentest Tools For Android
- Pentest Box Tools Download
- Hacking Tools For Pc
- Tools For Hacker
- Hack Website Online Tool
- Pentest Tools Online
- Hackrf Tools
- Hacking Tools For Windows 7
- Pentest Tools Github
- Hacker Tools Windows
- Termux Hacking Tools 2019
- Hacking Tools Github
- Hacking Tools Software
- Hacker Tools For Windows
- Hack Tools Github
- Nsa Hack Tools Download
- Pentest Tools Download
- Hack Tools Mac
- How To Hack
- Hack Tool Apk
- Pentest Tools Url Fuzzer
- Pentest Tools Bluekeep
- Hack Tools For Games
- Hacker
- Usb Pentest Tools
- Hacking Tools
- Hack Tools For Games
- Hacking Tools Online
- Hack Tools Online
- Pentest Tools Apk
- Hack Apps
- Pentest Tools For Android
- Hacking Tools 2019
- Android Hack Tools Github
- Hacker Tools For Pc
- Best Pentesting Tools 2018
- Pentest Tools Nmap
- Pentest Reporting Tools
- Hacking Tools 2019
- Hacker Search Tools
- Hacker Tools 2020
- Black Hat Hacker Tools
- Hacker Hardware Tools
- Hack Tools Github
- Usb Pentest Tools
- Hacking Tools Pc
- Hacking Tools Name
- Hacking Tools
- Pentest Tools For Mac
- Hacking Tools Kit
- Hacker Tools Free
- Hacking Tools 2020
No comments:
Post a Comment