This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More info
- Hacking Tools Hardware
- Hacking App
- Hack And Tools
- Github Hacking Tools
- Hack Tool Apk
- Pentest Tools Linux
- Pentest Automation Tools
- Hacking Tools Online
- Hacker Tools For Mac
- Pentest Tools Alternative
- Beginner Hacker Tools
- Pentest Tools Kali Linux
- Hacking Tools Download
- Hacker Tools Windows
- Pentest Tools Github
- Hacking Tools Free Download
- New Hack Tools
- Hacker Tools Github
- Pentest Tools Free
- Pentest Tools Tcp Port Scanner
- Pentest Tools Github
- Pentest Tools Free
- Pentest Tools
- Nsa Hacker Tools
- Pentest Tools Nmap
- Hacker Tools For Ios
- Pentest Tools Subdomain
- Hack Website Online Tool
- Nsa Hack Tools
- Hacking Tools And Software
- Hacker Tools Apk Download
- World No 1 Hacker Software
- Hack Tools
- Hacker Tools Online
- Nsa Hacker Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Windows
- Hacking Tools For Kali Linux
- Pentest Tools Website
- Android Hack Tools Github
- Hacker Tools Software
- Hack Tools 2019
- Hackers Toolbox
- Hack Tools Pc
- Pentest Recon Tools
- New Hacker Tools
- Underground Hacker Sites
- Pentest Tools Review
- Hack Tools Mac
- Tools Used For Hacking
- Hacking Tools For Windows 7
- Hacker Tools Linux
- Free Pentest Tools For Windows
- Beginner Hacker Tools
- Hacker Tools Apk
- Hacking Tools For Games
- Blackhat Hacker Tools
- Pentest Tools Find Subdomains
- Hacking Tools For Windows
- Pentest Tools Find Subdomains
- Pentest Tools Find Subdomains
- Growth Hacker Tools
- Computer Hacker
- Ethical Hacker Tools
- Hacker Tools Hardware
- What Are Hacking Tools
- Hack Tools For Mac
- Pentest Tools For Windows
- Pentest Reporting Tools
- Hackers Toolbox
- Github Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Hackers Toolbox
- Hack Apps
- What Is Hacking Tools
- Hacking Tools For Games
- Hack Tools For Games
- Hacker Tools Hardware
- Top Pentest Tools
- Hacking App
- Tools Used For Hacking
- Hacking Tools 2020
- Best Hacking Tools 2019
- Pentest Tools Subdomain
- Hacking Tools Pc
- Pentest Tools Open Source
- What Are Hacking Tools
- Hacking Tools For Mac
- Install Pentest Tools Ubuntu
- Hacking Tools Kit
- Pentest Tools Nmap
- Github Hacking Tools
- What Are Hacking Tools
- Pentest Tools Nmap
- Wifi Hacker Tools For Windows
- Pentest Tools Subdomain
- Ethical Hacker Tools
- Hacking Tools Mac
No comments:
Post a Comment