This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related news
- Pentest Recon Tools
- Hack Tools Pc
- Hacker Tools Windows
- Hack Tools Mac
- Pentest Tools Open Source
- Hack Tools For Windows
- Hackrf Tools
- Hacker Tools Free Download
- Pentest Tools List
- Underground Hacker Sites
- Growth Hacker Tools
- Pentest Tools Android
- Pentest Tools For Windows
- Hacking Tools For Windows
- Hacker Tools Mac
- Hacker Tools Online
- Hacker Tools Linux
- Hacking Tools For Windows Free Download
- Hacker
- Hack Tools Download
- Computer Hacker
- Hack Tools Download
- Pentest Tools Download
- Hacking Tools Usb
- Nsa Hack Tools
- Hacking Tools
- Hack Tools For Windows
- Hacker Tools Mac
- Hacking Tools Name
- Hacking Tools For Mac
- Android Hack Tools Github
- Pentest Box Tools Download
- Hacker Tools 2020
- Hacking Tools For Windows
- Hacker Tools 2020
- Hacker Tools List
- Pentest Tools Framework
- Top Pentest Tools
- Hacker Tools 2020
- Hacking Tools Name
- Pentest Tools Find Subdomains
- Hacking Tools
- Hacker Tools List
- Hack Rom Tools
- Hack Tools Online
- Nsa Hack Tools
- Hacker Tools Software
- Nsa Hack Tools
- Hacker Tools Apk
- Hack Tools Github
- Hack Website Online Tool
- Pentest Tools Download
- Hacking Tools Download
- Kik Hack Tools
- Hacker Tools 2019
- Hack Tools For Ubuntu
- Hacking Tools Free Download
- Pentest Tools Nmap
- What Is Hacking Tools
- Pentest Recon Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Github
- How To Install Pentest Tools In Ubuntu
- Hacking Apps
- Hacking Tools For Pc
- Pentest Reporting Tools
- Pentest Tools Framework
- Hackers Toolbox
- Android Hack Tools Github
- Hacking Tools Usb
No comments:
Post a Comment