This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More articles
- Hacking Tools For Pc
- Hacker Tools
- Best Pentesting Tools 2018
- Hacking Tools Pc
- Pentest Tools Free
- Install Pentest Tools Ubuntu
- Android Hack Tools Github
- Hacker Tools Windows
- Kik Hack Tools
- What Are Hacking Tools
- Hacker Tools 2019
- Computer Hacker
- Hack Tools For Games
- Ethical Hacker Tools
- Hacker Tools Free
- Hacking Tools Usb
- Computer Hacker
- Hack Tools
- Bluetooth Hacking Tools Kali
- Hacker Hardware Tools
- Growth Hacker Tools
- Hack Tools For Mac
- Hacker Tools For Ios
- Hacking Tools Windows 10
- Pentest Tools Find Subdomains
- Hackers Toolbox
- What Is Hacking Tools
- Pentest Tools For Windows
- Hack Tool Apk
- How To Install Pentest Tools In Ubuntu
- Best Hacking Tools 2019
- Hacking Tools Github
- Hack Tools Mac
- Hacker Search Tools
- Tools For Hacker
- Pentest Tools Website Vulnerability
- Hacker Tools Apk Download
- Pentest Tools Alternative
- Hacking Tools Github
- Computer Hacker
- Best Hacking Tools 2020
- Hack Apps
- Pentest Tools Download
- Hacking Tools For Games
- Hack Tools For Pc
- Hack Tools Pc
- Hack Tools For Ubuntu
- How To Make Hacking Tools
- Pentest Tools Url Fuzzer
- Hacking Tools For Games
- Hacker Tools Mac
- Hacking Tools Windows
- Pentest Tools Windows
- Hacking Tools Pc
- Pentest Tools Url Fuzzer
- Pentest Automation Tools
- Hacking Tools Pc
- Pentest Tools Free
- Hacking Tools Online
- Pentest Tools Website
- Hacking Tools For Kali Linux
- Hack Tools For Games
- Pentest Tools Windows
- Pentest Tools Find Subdomains
- Hacker Search Tools
- Hack Tools For Windows
- Hack Tools Mac
- Pentest Tools Framework
- Hacker Tools Apk Download
- Hack Tools For Pc
- Hacking Tools Windows
- Hacker Tools For Windows
- Pentest Tools Subdomain
- Hack Tools Github
- How To Hack
- Hacker Tools Software
- Hacker Tools Mac
- Hack Tools Mac
- Github Hacking Tools
- Top Pentest Tools
- Hacker Security Tools
- Pentest Tools Linux
- Hacking Tools For Games
- Android Hack Tools Github
- Hack Tools For Pc
- Hacker Hardware Tools
- Pentest Tools Url Fuzzer
- Pentest Tools For Mac
- Usb Pentest Tools
- Pentest Tools Linux
- Hack And Tools
- Hacking Tools Software
- Hack Tools For Windows
- Nsa Hack Tools Download
- Pentest Tools Github
- Hacking Tools For Pc
- Hack Tools For Mac
- Hack Tools Pc
- Hacking Tools Hardware
- What Are Hacking Tools
- Pentest Tools Github
- Hacker Hardware Tools
- What Are Hacking Tools
- Hacker Tools Apk Download
- What Are Hacking Tools
- Hacking Apps
- Best Hacking Tools 2020
- Hacking Tools Download
- Pentest Tools For Ubuntu
- Hacker Tools Mac
- Hacking App
- Growth Hacker Tools
- Hack Tools Pc
- Pentest Tools Framework
- Hacker Tools
- Pentest Tools Online
- Hack Rom Tools
- Hack App
- Pentest Tools List
- Hack Tools For Games
- Pentest Tools Review
- Hack Tools Github
- Top Pentest Tools
- Hacker Tools Windows
- Hacking Tools For Windows 7
- Hacking Tools Usb
- Install Pentest Tools Ubuntu
- Pentest Tools For Ubuntu
- Hack Tools For Pc
- Pentest Tools Open Source
- Hacking Tools Mac
- Hacker Tools Windows
- Pentest Tools For Mac
- Hack Tools Pc
- Hacker Tools For Ios
- Nsa Hacker Tools
- How To Make Hacking Tools
- Hacking Tools Mac
- Pentest Tools Github
- Android Hack Tools Github
- Hacker Security Tools
- Hack Tools For Mac
- Hacker Tools List
- Hacker Techniques Tools And Incident Handling
- Pentest Reporting Tools
- Bluetooth Hacking Tools Kali
- Nsa Hack Tools Download
- Hacker Tools Hardware
- Pentest Tools Url Fuzzer
- Hack Tools
- Tools Used For Hacking
- Hacker Security Tools
- Hacking Tools
- Hacker Tools For Mac
- Github Hacking Tools
- Nsa Hack Tools Download
- Pentest Reporting Tools
No hay comentarios:
Publicar un comentario