Monday, May 29, 2023

Koppeling - Adaptive DLL Hijacking / Dynamic Export Forwarding


This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.

This project is comprised of the following elements:

  • Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
  • Functions.dll: The "real" library which exposes valid functionality to the harness
  • Theif.dll: The "evil" library which is attempting to gain execution
  • NetClone.exe: A C# application which will clone exports from one DLL to another
  • PyClone.py: A python 3 script which mimics NetClone functionality

The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.

  • Stc-Forward: Forwards export names during the build process using linker comments
  • Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
  • Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
  • Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying

The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.


Example

Prepare a hijack scenario with an obviously incorrect DLL

> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.

> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.

Executing in the current configuration should result in an error

> whoami.exe 

"Entry Point Not Found"

Convert kernel32 to proxy functionality for wkscli

> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.

> whoami.exe
COMPUTER\User



Related word

  1. What Are Hacking Tools
  2. Hacker Tools For Mac
  3. Hack Tool Apk
  4. Nsa Hacker Tools
  5. Wifi Hacker Tools For Windows
  6. Hacker Tool Kit
  7. Hacker Techniques Tools And Incident Handling
  8. Blackhat Hacker Tools
  9. Pentest Tools Bluekeep
  10. Hacker Tools For Mac
  11. Pentest Tools Website Vulnerability
  12. Hacking Tools Free Download
  13. Hack Website Online Tool
  14. Hacking Tools Github
  15. Hacking Tools And Software
  16. Hacker Tools List
  17. Hack Tool Apk
  18. Pentest Tools Port Scanner
  19. Install Pentest Tools Ubuntu
  20. Hacking Tools For Beginners
  21. Ethical Hacker Tools
  22. Pentest Tools Review
  23. Hacking App
  24. Hacker Tools For Mac
  25. Hacking Tools Kit
  26. Hack Tools Pc
  27. Hacker Tools Online
  28. Hacker Tools 2019
  29. Hacker Hardware Tools
  30. Tools Used For Hacking
  31. What Is Hacking Tools
  32. Hacker Tools
  33. Pentest Tools For Android
  34. Hacker Tools Windows
  35. Pentest Tools Website Vulnerability
  36. Pentest Tools Windows
  37. Hacker Tools Hardware
  38. Hacker Hardware Tools
  39. Pentest Tools For Ubuntu
  40. How To Make Hacking Tools
  41. Hacker Tools Windows
  42. Pentest Tools Subdomain
  43. Hack Tools Mac
  44. Pentest Tools Windows
  45. Hacker Tools 2019
  46. Pentest Recon Tools
  47. Hacker Tools 2019
  48. Hack Tools Github
  49. Hacker Tools Windows
  50. Pentest Tools Apk
  51. Hacker Tools 2019
  52. Hackrf Tools
  53. Best Pentesting Tools 2018
  54. Pentest Tools Bluekeep
  55. Hack Website Online Tool
  56. New Hacker Tools
  57. Hacker Tools 2019
  58. Pentest Tools For Mac
  59. Hacker Tool Kit
  60. Hack Tools 2019
  61. Hacking Tools Windows
  62. Pentest Tools Review
  63. Top Pentest Tools
  64. Pentest Tools
  65. Hacker Tool Kit
  66. Hack Tools For Windows
  67. Hacking Tools For Windows Free Download
  68. Beginner Hacker Tools
  69. Pentest Tools For Ubuntu
  70. Hacking Tools For Kali Linux
  71. Wifi Hacker Tools For Windows
  72. Hacking Tools For Pc
  73. Hacking Tools Usb
  74. Hacking Tools For Windows 7
  75. Tools Used For Hacking
  76. Bluetooth Hacking Tools Kali
  77. Github Hacking Tools
  78. Pentest Tools Find Subdomains
  79. Pentest Tools Linux
  80. Bluetooth Hacking Tools Kali
  81. Nsa Hack Tools Download
  82. Hack Tools For Ubuntu
  83. Hacker Tools Hardware
  84. Pentest Tools Github
  85. Pentest Tools For Mac
  86. What Is Hacking Tools
  87. Pentest Tools Free
  88. Hacker Tools Mac
  89. Hacking Tools Windows 10
  90. New Hacker Tools
  91. Kik Hack Tools
  92. Best Pentesting Tools 2018
  93. Pentest Tools List
  94. Hacker
  95. Pentest Tools For Mac
  96. Hacker Search Tools
  97. Hacker Tools Online
  98. Hacking Tools For Mac
  99. Hacker Tools Apk Download
  100. Hacking Tools Software
  101. Tools Used For Hacking
  102. Pentest Tools Online
  103. Best Hacking Tools 2020
  104. New Hacker Tools
  105. Pentest Tools Website Vulnerability
  106. Pentest Tools Open Source
  107. Hacker Tools List
  108. Hacker Search Tools
  109. Pentest Box Tools Download
  110. Hacking Tools
  111. Pentest Automation Tools
  112. Hacker Tools Free Download
  113. Hack Tools For Ubuntu
  114. Pentest Tools Online
  115. Hacking Tools 2019
  116. Hacking Apps
  117. Pentest Tools Tcp Port Scanner
  118. Pentest Tools Nmap
  119. Hak5 Tools
  120. Hacker Tool Kit
  121. Hacking Tools For Mac
  122. World No 1 Hacker Software
  123. New Hacker Tools
  124. Free Pentest Tools For Windows
  125. Hacker Tools For Mac
  126. Hacking Tools For Windows 7
  127. Pentest Tools Url Fuzzer
  128. Hacking Tools Windows
  129. Hack Tools For Ubuntu
  130. Hacking Tools Free Download
  131. Pentest Tools Bluekeep
  132. Hacking Tools Github
  133. Hacking Tools Hardware
  134. World No 1 Hacker Software
  135. Best Pentesting Tools 2018
  136. Wifi Hacker Tools For Windows
  137. Hacker Tools For Mac
  138. Hack Rom Tools
  139. Tools 4 Hack

No comments:

Post a Comment