This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related posts
- Hacking Tools For Pc
- Pentest Tools Url Fuzzer
- Black Hat Hacker Tools
- Pentest Tools Framework
- Tools Used For Hacking
- How To Hack
- How To Install Pentest Tools In Ubuntu
- Beginner Hacker Tools
- Hacking Tools Usb
- Termux Hacking Tools 2019
- Hacker Hardware Tools
- Hack Tools Mac
- Pentest Tools Kali Linux
- Hak5 Tools
- Hacker Tools For Windows
- Hacker
- Hacking Tools For Windows 7
- Hak5 Tools
- Github Hacking Tools
- Pentest Tools Alternative
- Beginner Hacker Tools
- Pentest Tools For Mac
- Pentest Tools For Ubuntu
- Hacker Tools For Mac
- Hacking Tools And Software
- Hacker Search Tools
- Pentest Reporting Tools
- Hacking Tools Name
- Pentest Tools Port Scanner
- Hacker Tools For Ios
- Tools Used For Hacking
- Hacking App
- Pentest Tools Open Source
- Ethical Hacker Tools
- Hack Tools For Games
- Pentest Tools Android
- Pentest Tools Github
- Hacking Tools 2019
- Bluetooth Hacking Tools Kali
- Hackers Toolbox
- Hacking Tools Hardware
- Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Underground Hacker Sites
- Pentest Tools
- Pentest Tools Kali Linux
- Tools 4 Hack
- How To Hack
- Hack Tools For Pc
- Hacker Tools Linux
- Best Hacking Tools 2020
- Nsa Hack Tools
- Hack App
- Pentest Tools
- Hacking Tools Windows
- Hacking Tools Free Download
- Install Pentest Tools Ubuntu
- Easy Hack Tools
- Hacker Tools Linux
- Hacker Tools Mac
- Termux Hacking Tools 2019
- Hack Tools Download
- Tools 4 Hack
- Pentest Tools Free
- Hacker Tools Free Download
- Hacking Tools Windows 10
- Hacker Tools For Ios
- Tools 4 Hack
- Hack Tool Apk No Root
- Underground Hacker Sites
- Hacker Tools For Ios
- Hacking Tools Pc
- Pentest Tools Android
- Pentest Tools Port Scanner
- Hacker Security Tools
- Hacking Tools For Windows
- Pentest Tools Download
- Tools Used For Hacking
- Hacking Tools For Mac
- Hacker Tools Apk Download
- Best Hacking Tools 2020
- Hacker Tools Software
- Wifi Hacker Tools For Windows
- Hacker Tools Linux
- Free Pentest Tools For Windows
- Hack Tool Apk No Root
- What Are Hacking Tools
- Android Hack Tools Github
- Free Pentest Tools For Windows
- Pentest Tools Kali Linux
- Pentest Tools Kali Linux
- Hacker Tools For Windows
- Hacking Tools For Pc
- Hacking Tools Pc
- How To Hack
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Framework
- Hackers Toolbox
- Hack Tools For Mac
- Pentest Tools Android
- Underground Hacker Sites
- Hacker Tools Free
- Computer Hacker
- Hacker Tools Software
- Hacker Tools For Pc
- Termux Hacking Tools 2019
- Hack Tools
- Hack Tools
- Best Pentesting Tools 2018
- Hacker Hardware Tools
- Hacking Tools Free Download
- Hacking Tools For Beginners
- Pentest Tools
- Blackhat Hacker Tools
- Ethical Hacker Tools
- Nsa Hack Tools
- Hacking Tools Pc
- How To Hack
- Hackers Toolbox
- Hack App
- Hack Tools Mac
- Hack Tool Apk No Root
- Hacking Tools Software
- Easy Hack Tools
- Android Hack Tools Github
- Pentest Tools Github
- Top Pentest Tools
- Hacker Tools List
- Pentest Tools For Android
- Hack Tools For Mac
- Pentest Tools Open Source
- Usb Pentest Tools
- Hacker Tools Linux
- Pentest Tools Url Fuzzer
- Pentest Tools Tcp Port Scanner
- Pentest Recon Tools
- Hack Website Online Tool
- Pentest Tools Website
- Hacker Tools List
- Ethical Hacker Tools
- Hacker Tools Apk Download
- Growth Hacker Tools
- Hack Tools For Windows
- Hacking Tools 2020
- Pentest Tools Find Subdomains
- Bluetooth Hacking Tools Kali
- Pentest Tools Open Source
- Hacking Tools For Games
- Pentest Recon Tools
- Computer Hacker
- Pentest Tools Url Fuzzer
- Hack Tools For Windows
- Hack Tool Apk
- New Hack Tools
- Hacker Hardware Tools
- Hacker Tools Github
- Hacking Tools Software
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Mac
Geen opmerkingen:
Een reactie posten