This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More information
- Hacker Hardware Tools
- Pentest Tools Apk
- Hacks And Tools
- Hackrf Tools
- Pentest Automation Tools
- Hacking Tools For Beginners
- Hacker Tools 2020
- Hack App
- Hack Tools For Pc
- Hacking Tools
- Black Hat Hacker Tools
- Hack Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Hacker Tools Apk Download
- Hacking Tools Github
- Hack Tools For Windows
- Best Pentesting Tools 2018
- Hackrf Tools
- Usb Pentest Tools
- Hacker Tools Github
- Pentest Tools Open Source
- Hack Tools Download
- Pentest Tools Subdomain
- Hacking Tools For Beginners
- Hack Tools For Ubuntu
- Bluetooth Hacking Tools Kali
- Hacking Tools Usb
- Hacker Tools Free
- Hacking Tools Name
- Pentest Automation Tools
- Hacker Security Tools
- Pentest Tools Tcp Port Scanner
- How To Make Hacking Tools
- Hacker
- Hacking Tools Github
- Hacking Tools For Games
- Pentest Tools Android
- Best Pentesting Tools 2018
- Hacker Tools
- Hack Tools
- Hacker Tools Apk
- Pentest Reporting Tools
- Pentest Tools For Windows
- Pentest Tools Online
- Hacking Tools For Kali Linux
- Hacking Tools Kit
- Pentest Box Tools Download
- Pentest Tools Review
- Usb Pentest Tools
- Hacker Tools 2020
- Hacking Tools Name
- Hacker Tools Free Download
- Hacker Tools For Mac
- Hack Tools Github
- Hack Tools
- Hack Rom Tools
- Hacker Tools Online
- Growth Hacker Tools
- Free Pentest Tools For Windows
- Pentest Tools Open Source
- Hack Tools Mac
- Hacker Tools For Pc
- Underground Hacker Sites
- Free Pentest Tools For Windows
- Pentest Tools Url Fuzzer
- New Hack Tools
- Hack Website Online Tool
- Usb Pentest Tools
- Hack Apps
- Hacker Tools Mac
- Hacker Tools For Ios
- Hack Tools Mac
- Hacker Search Tools
- Pentest Tools Github
- Pentest Tools Nmap
- Game Hacking
- Hacker Tools 2019
- Hack Tool Apk No Root
- Pentest Tools Free
- Hack Tools For Pc
- Pentest Recon Tools
- Hacker Tools Software
- Underground Hacker Sites
- Pentest Automation Tools
- Pentest Tools Online
No comments:
Post a Comment