This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- What Are Hacking Tools
- Top Pentest Tools
- Pentest Tools Windows
- Hacker Tools Apk Download
- Free Pentest Tools For Windows
- Hacking Tools For Pc
- Hack Tools Pc
- Hacker Tools Hardware
- Hack Tools For Mac
- Tools 4 Hack
- Pentest Tools Github
- Hacker Tools For Windows
- Nsa Hacker Tools
- Hacker Tools 2020
- Pentest Tools Port Scanner
- Hacking Tools
- Hacker Tools Mac
- Nsa Hack Tools Download
- Hack And Tools
- Pentest Tools Subdomain
- Pentest Tools Tcp Port Scanner
- Pentest Tools Download
- Hacker Tools Software
- Pentest Tools List
- Pentest Tools Url Fuzzer
- Kik Hack Tools
- Hacking Tools Download
- Hacker Tools Hardware
- New Hack Tools
- Hack Tool Apk
- Hack Rom Tools
- Hack Website Online Tool
- Pentest Tools Github
- Hacking Tools For Pc
- Hacking Tools For Pc
- Pentest Tools List
- Hack Tool Apk
- Underground Hacker Sites
- Pentest Tools Bluekeep
- Hacker Tools Free Download
- Beginner Hacker Tools
- Pentest Tools Review
- Pentest Tools Port Scanner
- Github Hacking Tools
- Easy Hack Tools
- Hack Website Online Tool
- Hacking Tools Online
- Hack Tools Pc
- Hack Tools Pc
- Hacker Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hack Tools Github
- Hacking Tools Kit
- Black Hat Hacker Tools
- Pentest Tools Android
- Hacking Tools Software
- Wifi Hacker Tools For Windows
- Pentest Tools Kali Linux
- Hacker Tools Software
- World No 1 Hacker Software
- Hacking Tools Free Download
No comments:
Post a Comment