This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hacking Tools And Software
- World No 1 Hacker Software
- Hacker Security Tools
- What Is Hacking Tools
- Hack Website Online Tool
- Pentest Tools Open Source
- Hacking Tools Software
- Pentest Reporting Tools
- Hacker Tools For Mac
- Pentest Tools Open Source
- Hack Tools Pc
- Hack Tools
- Hack Tool Apk No Root
- Hack Tool Apk No Root
- World No 1 Hacker Software
- Hack Tools 2019
- Hacking Tools For Windows 7
- Hacking Tools Software
- Game Hacking
- Underground Hacker Sites
- Pentest Tools Online
- Hack Rom Tools
- Hacking Tools For Games
- Pentest Tools Website
- Pentest Tools Windows
- Hacking Tools Mac
- Pentest Tools Tcp Port Scanner
- Underground Hacker Sites
- New Hack Tools
- Pentest Tools Bluekeep
- Hack Tools For Mac
- What Are Hacking Tools
- Hackers Toolbox
- Hacking Tools Free Download
- Pentest Tools Bluekeep
- Install Pentest Tools Ubuntu
- Hacker Search Tools
- Hacker Tools
- Pentest Tools Github
- Hacker Tools For Pc
- What Are Hacking Tools
- What Is Hacking Tools
- Hack Tools
- Hack Tools Mac
- Pentest Tools For Mac
- Best Pentesting Tools 2018
- Hack Tools
- Beginner Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Github
- Pentest Tools Download
- Hacks And Tools
- Computer Hacker
- Kik Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Linux
- Termux Hacking Tools 2019
- Hack Apps
- Pentest Tools Website Vulnerability
- What Are Hacking Tools
- Pentest Tools List
- Pentest Box Tools Download
- Hacker Tools Free
- Pentest Tools Windows
- New Hacker Tools
- Hacking Tools Name
- Bluetooth Hacking Tools Kali
- Pentest Tools Nmap
- Pentest Tools Review
- Pentest Tools Download
- Hack Tools Github
- Hacking Tools Online
- Hack Tools For Ubuntu
- Hacking Tools Usb
- Easy Hack Tools
- Hacker Hardware Tools
- Hacking Tools For Windows
- Hack Tools
- Pentest Tools Alternative
- Hacking Tools For Mac
- Computer Hacker
- Pentest Tools Alternative
- Pentest Tools Apk
- Wifi Hacker Tools For Windows
- Hacker Tools Free
- Hacker Tools For Pc
- Pentest Tools Website
- Hackrf Tools
- Tools For Hacker
- Hacker Tools For Ios
- Hacking Tools Free Download
- Hacking Tools Free Download
- Pentest Tools Windows
- Bluetooth Hacking Tools Kali
- Hacker Tools Free
- Hacking Tools Hardware
- Hak5 Tools
- What Is Hacking Tools
- Blackhat Hacker Tools
- Hack App
- Pentest Tools Website Vulnerability
- Github Hacking Tools
- Ethical Hacker Tools
- Hacker Tools For Windows
- Hacker Tools Hardware
- Tools For Hacker
- Hacking Tools Mac
- Termux Hacking Tools 2019
- Pentest Recon Tools
- Pentest Tools Open Source
- Kik Hack Tools
- Bluetooth Hacking Tools Kali
- Hack Tools Download
- Pentest Tools Subdomain
- New Hack Tools
- Hacker Hardware Tools
- Hacker Security Tools
- Computer Hacker
- Pentest Tools Tcp Port Scanner
- Pentest Tools List
- Pentest Tools Url Fuzzer
- Pentest Tools Free
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Mac
- Pentest Tools Framework
- How To Install Pentest Tools In Ubuntu
- What Are Hacking Tools
- Hacking Tools Mac
- What Is Hacking Tools
- Hacking Tools And Software
- Pentest Recon Tools
- Wifi Hacker Tools For Windows
- Hacking Tools Mac
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Mac
- Hak5 Tools
- Pentest Tools
- Hackrf Tools
- Hacker Security Tools
- Nsa Hack Tools Download
- Hak5 Tools
- Pentest Tools Android
- Hacker Tools Free
- Hack Tools For Mac
No comments:
Post a Comment