This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Continue reading
- Pentest Tools Framework
- Blackhat Hacker Tools
- Pentest Tools Website
- What Are Hacking Tools
- Hak5 Tools
- Best Hacking Tools 2020
- Hacker Tools Free
- Physical Pentest Tools
- Hacking Tools For Games
- Pentest Tools Framework
- Hacking Tools 2019
- Pentest Tools Online
- Hacker Tools Free Download
- Hacking Tools For Windows Free Download
- Pentest Tools Bluekeep
- Hacker Tools Online
- Black Hat Hacker Tools
- Hack Tools
- Hacker Tools 2020
- Hacking Tools Free Download
- What Are Hacking Tools
- Hack Tool Apk
- Hacker Tools For Ios
- Hack App
- New Hack Tools
- Pentest Reporting Tools
- Hacking Tools Github
- Hacker Tools Linux
- Pentest Tools Port Scanner
- Hacking Tools Software
- Pentest Tools Subdomain
- Best Pentesting Tools 2018
- Pentest Tools Android
- Hack Tools
- Hack Website Online Tool
- Hack Rom Tools
- Hack Tools Mac
- Hack Tools
- Hack And Tools
- Hacker Tools 2019
- Hacking Tools For Games
- Pentest Tools Free
- Kik Hack Tools
- Hack Tools For Windows
- Hacking Tools For Windows 7
- Pentest Tools List
- Hack Tools 2019
- Hacking Tools Pc
- Hacking Tools Hardware
- Hack Rom Tools
- Hacker Tools Apk
- Hackrf Tools
- Hack Website Online Tool
- What Is Hacking Tools
- Hacking Tools Free Download
- Hak5 Tools
- Hacker Tools
- Hacker Tools Mac
- Hack Tools 2019
- Hacker Tools 2020
- Hacker Tools Apk Download
- Hacker Tools 2019
- Wifi Hacker Tools For Windows
- Hacking Tools And Software
- Pentest Reporting Tools
- Hacking Tools Usb
- Best Pentesting Tools 2018
- Hacking Tools Windows
- Hacking Tools Online
- Kik Hack Tools
- Pentest Tools Find Subdomains
- Pentest Tools For Windows
- Hacker Tools Free Download
- Pentest Reporting Tools
- Hacking Tools Kit
- Hacking Tools For Games
- Hack Website Online Tool
- Hacking Tools For Windows
- Beginner Hacker Tools
- New Hack Tools
- Hack Tools Pc
- Hack Tools
- Hack Tools Mac
- Termux Hacking Tools 2019
- Hacker Tools Linux
- Hacker Hardware Tools
- Pentest Tools Nmap
- Hacker Tools Windows
- Best Pentesting Tools 2018
- Hacking Tools For Windows 7
- Pentest Tools List
- Physical Pentest Tools
- Hacking Tools For Windows 7
- Hacking Tools For Windows
- Pentest Tools Framework
- Hacker Tool Kit
- Black Hat Hacker Tools
- Tools Used For Hacking
- Pentest Tools Apk
- Black Hat Hacker Tools
- Hack Tool Apk
- Hacking Tools Windows
- World No 1 Hacker Software
- Hacking Tools 2019
- Top Pentest Tools
- Pentest Tools Open Source
- How To Hack
- Pentest Tools Review
- Hacking Tools For Windows 7
- Hack Tools For Ubuntu
- Game Hacking
- Hacker Tools Windows
- Hacking Tools Download
- Hack Tools
- Hack Rom Tools
- Black Hat Hacker Tools
- Top Pentest Tools
- Underground Hacker Sites
- Hacking App
- Hacking Apps
- Hack Apps
- Pentest Tools Review
- Hacking Tools Software
- Hacker Tools 2019
- Hack Tools For Mac
- How To Make Hacking Tools
- Hacker Tools Linux
- Tools For Hacker
- Pentest Tools Framework
- Pentest Box Tools Download
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Online
- Bluetooth Hacking Tools Kali
- Nsa Hack Tools
- Pentest Tools Url Fuzzer
- Hacking Tools For Windows
- Pentest Tools Nmap
- Usb Pentest Tools
- Top Pentest Tools
- Hacking Tools Windows
- How To Make Hacking Tools
- Pentest Tools Windows
- Hacker Tools For Mac
- Hacker Tools Hardware
- Hacking Tools For Windows
- Hacker Tools Software
- Hacker Tools List
- Hacking Tools For Kali Linux
- World No 1 Hacker Software
- Hack App
- Hack Tools Online
- Pentest Tools Url Fuzzer
- Nsa Hack Tools
- Growth Hacker Tools
- Github Hacking Tools
No comments:
Post a Comment