This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- World No 1 Hacker Software
- Hacker Tools Free Download
- How To Make Hacking Tools
- Blackhat Hacker Tools
- Hack Tools Mac
- Hack Tools Pc
- Hack Tool Apk No Root
- New Hack Tools
- Growth Hacker Tools
- Best Hacking Tools 2019
- Hack Tools For Mac
- Hacker Tools Hardware
- Hacking Tools For Games
- Hack Tools Pc
- Hack Tools Pc
- Pentest Tools Free
- Pentest Tools Find Subdomains
- Hacking Tools Usb
- Hacker Tools For Pc
- Nsa Hacker Tools
- Hacker Tools Apk
- Hacking Tools Hardware
- Growth Hacker Tools
- Best Hacking Tools 2019
- Hack Tool Apk
- Ethical Hacker Tools
- Hacker Tools For Mac
- Hacking Tools Kit
- Pentest Tools Kali Linux
- Pentest Tools Download
- Hacking Apps
- Pentest Tools Website Vulnerability
- Pentest Tools Free
- Hacking Tools For Beginners
- Hack Tool Apk No Root
- Hacking Tools Windows 10
- Hacking Apps
- Hacker Tools For Pc
- Hacking Tools Windows 10
- Wifi Hacker Tools For Windows
- Hacking Tools Pc
- Hackers Toolbox
- Hacking Tools For Kali Linux
- Hacking Tools 2020
- Pentest Tools Nmap
- Computer Hacker
- Hack Tools Online
- Hack Tool Apk
- Kik Hack Tools
- Hacking Apps
- Hack Apps
- Hacker Tools 2019
- Hacking Tools Windows 10
- Pentest Recon Tools
- Hacker Tools For Windows
- Hacking Tools 2019
- Hacker Tools For Pc
- Hacking Tools For Games
- Hacking Tools Kit
- Hacker Tools For Ios
- Beginner Hacker Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Website
- Ethical Hacker Tools
- Hack Tools For Pc
- Pentest Tools Find Subdomains
- Pentest Tools Apk
- How To Make Hacking Tools
- Hacker Tools For Windows
- Tools Used For Hacking
- Pentest Tools Download
- Pentest Automation Tools
- Top Pentest Tools
- Hack And Tools
- Hack Tools Github
- Hack Tools For Games
- New Hack Tools
- Hacking Tools 2019
- Pentest Tools Online
No comments:
Post a Comment