This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Best Pentesting Tools 2018
- Hacker Tools List
- Hack Tool Apk
- Hacker Tools Apk Download
- Hacking Tools Kit
- Pentest Tools Online
- Tools For Hacker
- Android Hack Tools Github
- Pentest Tools Find Subdomains
- Free Pentest Tools For Windows
- Hacker Security Tools
- Ethical Hacker Tools
- Hack Tools 2019
- Hacking Tools Kit
- Pentest Tools Free
- Physical Pentest Tools
- Hacking Tools Windows 10
- Pentest Tools Android
- Pentest Tools Website
- Pentest Tools Kali Linux
- Pentest Tools Download
- Hacking Tools 2020
- Hacker Tool Kit
- Pentest Box Tools Download
- Hacking Tools Software
- Easy Hack Tools
- World No 1 Hacker Software
- Pentest Tools Find Subdomains
- Hack Tools
- Hacking Tools Usb
- What Are Hacking Tools
- Hacker Tools For Pc
- Pentest Tools Subdomain
- Termux Hacking Tools 2019
- Hacker Tools List
- Pentest Tools Website Vulnerability
- Hack Tools Github
- Hacker Tool Kit
- Hacker Tools Free Download
- Hacker Tools List
- Pentest Tools Find Subdomains
- Ethical Hacker Tools
- Hacking Tools Github
- Hacking Tools Windows
- Hacker Tools Free Download
- Pentest Tools For Android
- Hack And Tools
- Pentest Tools Subdomain
- What Are Hacking Tools
- Hacking Tools For Pc
- Hacker Tools Mac
- Hacker Search Tools
- Nsa Hack Tools
- Hack Tools For Ubuntu
- Hacking Tools Hardware
- Hacker Tools Hardware
- Hacker Tools Free Download
- Pentest Tools Port Scanner
- Easy Hack Tools
- Hack Tools For Pc
- Ethical Hacker Tools
- Pentest Tools Website Vulnerability
- Hack Tools For Mac
- Hacking App
- Pentest Tools Nmap
- Hacker Tools For Windows
- Best Hacking Tools 2019
- Hack Tools For Games
- Hacking Tools Name
- Pentest Tools For Android
- Pentest Tools For Android
- Hacker Tools For Pc
- Pentest Tools List
- Top Pentest Tools
- Wifi Hacker Tools For Windows
- Tools 4 Hack
- Pentest Tools Kali Linux
- Hacking Tools Hardware
- Free Pentest Tools For Windows
- Hacking Tools Name
- Hacker
- Hack Tool Apk
- Hack Tools For Ubuntu
- Hacking Tools Pc
- Pentest Tools Bluekeep
- Hacker Tools List
- Pentest Tools Linux
- Hacking Tools Pc
- Hacking Tools For Beginners
- Hacking Tools Free Download
- Hacking Tools Mac
- Hacker Tools Windows
- Pentest Tools Website Vulnerability
- Hacking Tools
- Hacking Tools And Software
- Hack Tools Pc
- Hack Tools Github
- Hacker Tools For Mac
- Hack Tools Online
- Hak5 Tools
- Hack Tools Github
- Hacker Tools
- Hack Tools Mac
- Hacker Tools Software
- Computer Hacker
- Hacking Tools For Pc
- World No 1 Hacker Software
- Hack Tools For Pc
- Hacker Security Tools
ليست هناك تعليقات:
إرسال تعليق