This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related word
- What Are Hacking Tools
- Hacker Tools For Mac
- Hack Tool Apk
- Nsa Hacker Tools
- Wifi Hacker Tools For Windows
- Hacker Tool Kit
- Hacker Techniques Tools And Incident Handling
- Blackhat Hacker Tools
- Pentest Tools Bluekeep
- Hacker Tools For Mac
- Pentest Tools Website Vulnerability
- Hacking Tools Free Download
- Hack Website Online Tool
- Hacking Tools Github
- Hacking Tools And Software
- Hacker Tools List
- Hack Tool Apk
- Pentest Tools Port Scanner
- Install Pentest Tools Ubuntu
- Hacking Tools For Beginners
- Ethical Hacker Tools
- Pentest Tools Review
- Hacking App
- Hacker Tools For Mac
- Hacking Tools Kit
- Hack Tools Pc
- Hacker Tools Online
- Hacker Tools 2019
- Hacker Hardware Tools
- Tools Used For Hacking
- What Is Hacking Tools
- Hacker Tools
- Pentest Tools For Android
- Hacker Tools Windows
- Pentest Tools Website Vulnerability
- Pentest Tools Windows
- Hacker Tools Hardware
- Hacker Hardware Tools
- Pentest Tools For Ubuntu
- How To Make Hacking Tools
- Hacker Tools Windows
- Pentest Tools Subdomain
- Hack Tools Mac
- Pentest Tools Windows
- Hacker Tools 2019
- Pentest Recon Tools
- Hacker Tools 2019
- Hack Tools Github
- Hacker Tools Windows
- Pentest Tools Apk
- Hacker Tools 2019
- Hackrf Tools
- Best Pentesting Tools 2018
- Pentest Tools Bluekeep
- Hack Website Online Tool
- New Hacker Tools
- Hacker Tools 2019
- Pentest Tools For Mac
- Hacker Tool Kit
- Hack Tools 2019
- Hacking Tools Windows
- Pentest Tools Review
- Top Pentest Tools
- Pentest Tools
- Hacker Tool Kit
- Hack Tools For Windows
- Hacking Tools For Windows Free Download
- Beginner Hacker Tools
- Pentest Tools For Ubuntu
- Hacking Tools For Kali Linux
- Wifi Hacker Tools For Windows
- Hacking Tools For Pc
- Hacking Tools Usb
- Hacking Tools For Windows 7
- Tools Used For Hacking
- Bluetooth Hacking Tools Kali
- Github Hacking Tools
- Pentest Tools Find Subdomains
- Pentest Tools Linux
- Bluetooth Hacking Tools Kali
- Nsa Hack Tools Download
- Hack Tools For Ubuntu
- Hacker Tools Hardware
- Pentest Tools Github
- Pentest Tools For Mac
- What Is Hacking Tools
- Pentest Tools Free
- Hacker Tools Mac
- Hacking Tools Windows 10
- New Hacker Tools
- Kik Hack Tools
- Best Pentesting Tools 2018
- Pentest Tools List
- Hacker
- Pentest Tools For Mac
- Hacker Search Tools
- Hacker Tools Online
- Hacking Tools For Mac
- Hacker Tools Apk Download
- Hacking Tools Software
- Tools Used For Hacking
- Pentest Tools Online
- Best Hacking Tools 2020
- New Hacker Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Open Source
- Hacker Tools List
- Hacker Search Tools
- Pentest Box Tools Download
- Hacking Tools
- Pentest Automation Tools
- Hacker Tools Free Download
- Hack Tools For Ubuntu
- Pentest Tools Online
- Hacking Tools 2019
- Hacking Apps
- Pentest Tools Tcp Port Scanner
- Pentest Tools Nmap
- Hak5 Tools
- Hacker Tool Kit
- Hacking Tools For Mac
- World No 1 Hacker Software
- New Hacker Tools
- Free Pentest Tools For Windows
- Hacker Tools For Mac
- Hacking Tools For Windows 7
- Pentest Tools Url Fuzzer
- Hacking Tools Windows
- Hack Tools For Ubuntu
- Hacking Tools Free Download
- Pentest Tools Bluekeep
- Hacking Tools Github
- Hacking Tools Hardware
- World No 1 Hacker Software
- Best Pentesting Tools 2018
- Wifi Hacker Tools For Windows
- Hacker Tools For Mac
- Hack Rom Tools
- Tools 4 Hack
No comments:
Post a Comment