This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More articles
- Github Hacking Tools
- Hacker Hardware Tools
- Hacker Tools Free Download
- How To Make Hacking Tools
- Hak5 Tools
- Free Pentest Tools For Windows
- Install Pentest Tools Ubuntu
- Hacker Tools For Mac
- Underground Hacker Sites
- Hacking Tools Kit
- Hack Tools For Pc
- Hacker Tools For Ios
- Hacking Tools Mac
- Pentest Tools Github
- Hacking App
- Beginner Hacker Tools
- Tools For Hacker
- Hacking Apps
- Hacker Tools Online
- What Are Hacking Tools
- Hacker Tools For Pc
- Ethical Hacker Tools
- Hack Tools 2019
- Pentest Tools Url Fuzzer
- Pentest Tools Linux
- Termux Hacking Tools 2019
- Hacking Tools For Mac
- Hacking Tools For Windows Free Download
- Hacking Tools Windows
- Pentest Tools Alternative
- Growth Hacker Tools
- Hack Tools For Pc
- Hacking Tools Online
- Hacker Tools For Ios
- Top Pentest Tools
- Pentest Tools Framework
- Pentest Tools Bluekeep
- Pentest Tools Apk
- Hacking Tools Pc
- Hacker Hardware Tools
- Hack Tools For Mac
- Hacker Search Tools
- Underground Hacker Sites
- Pentest Tools Linux
- Pentest Tools Url Fuzzer
- Hacking Tools For Windows 7
- Hacking Tools Hardware
- Hacking Tools For Pc
- Hack And Tools
- Pentest Tools Download
- Pentest Tools
- Hacker Search Tools
- Game Hacking
- Pentest Tools Find Subdomains
- Hack Tool Apk
- Black Hat Hacker Tools
- Hacking Tools For Kali Linux
- Hacking Tools For Windows Free Download
- Tools For Hacker
- Hacker Tool Kit
- Pentest Tools Alternative
- Top Pentest Tools
- Hacker Tools For Ios
- Pentest Automation Tools
- Hacker Search Tools
- Hacking Tools For Windows Free Download
- Github Hacking Tools
- Bluetooth Hacking Tools Kali
- Hack Tools For Windows
- Hacking Apps
- Hacking Tools Download
- Android Hack Tools Github
- Hacker Tools Online
- Hacking Tools Online
- Pentest Tools Tcp Port Scanner
- Hacker Tools For Windows
- Kik Hack Tools
- Pentest Tools Port Scanner
- Pentest Tools Github
- Pentest Tools
- Termux Hacking Tools 2019
- Growth Hacker Tools
- Hack App
- Hacking Tools 2019
- What Are Hacking Tools
- Android Hack Tools Github
- Pentest Tools Online
- Pentest Tools Free
- Pentest Tools For Mac
- Pentest Automation Tools
- Pentest Tools Apk
- Hack Tools Pc
- Hack Tools For Games
- Pentest Tools Find Subdomains
- Hacking Tools For Mac
- Tools Used For Hacking
- Hacker Tools Mac
- Growth Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Reporting Tools
- Hacking Tools Download
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hacker Tools 2020
- Nsa Hack Tools Download
- Hacking Tools Github
- Hacking Apps
- Hack And Tools
- Hacker Tools
- Hacking Tools And Software
- Pentest Recon Tools
- Hacking Tools Name
- Hacking Tools Pc
- Hack Tool Apk No Root
- Pentest Reporting Tools
- Pentest Tools Subdomain
- Tools For Hacker
- Pentest Tools Github
- Hacker Tools Software
- Android Hack Tools Github
- Pentest Tools
- Hacking Tools Github
- Pentest Tools List
- Pentest Tools Subdomain
- Pentest Tools Online
- Hacking Tools Name
- Hack Tool Apk No Root
- Pentest Tools For Android
- Hacker Tools
- Hack Tools For Ubuntu
- Pentest Tools Framework
- Pentest Tools For Windows
- How To Install Pentest Tools In Ubuntu
- Hacking Tools And Software
- Hacker Tools Windows
- Hack App
- Best Hacking Tools 2019
- Hacking Tools And Software
- Best Hacking Tools 2020
- Pentest Tools Free
- Hack Tools For Windows
- Hacking Tools
- Physical Pentest Tools
- Hacker Tools For Mac
- Pentest Automation Tools
- Hacker Tools For Pc
- Pentest Tools Nmap
- Hacker Tools Software
- Github Hacking Tools
- Hack Apps
- Pentest Tools For Mac
- New Hack Tools
- Hacker Tools Hardware
- Pentest Box Tools Download
- Hacker Tools For Pc
- Pentest Tools List
- Wifi Hacker Tools For Windows
- Hak5 Tools
- Hacker Techniques Tools And Incident Handling
- Hacks And Tools
- Pentest Tools Kali Linux
- Hacker Tools For Pc
0 comments:
Post a Comment