This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related news
- Nsa Hack Tools
- Hackers Toolbox
- What Is Hacking Tools
- Hack App
- How To Hack
- Black Hat Hacker Tools
- Nsa Hack Tools Download
- Termux Hacking Tools 2019
- Hack Tools
- Hacker Search Tools
- Pentest Tools For Android
- Hacking Tools For Beginners
- Pentest Tools For Windows
- Pentest Tools Linux
- Hacker Tools Linux
- Pentest Tools Find Subdomains
- Hacking Tools For Windows Free Download
- Hacker Tools 2019
- Pentest Tools Download
- New Hack Tools
- Pentest Tools Android
- Hacking Tools Mac
- Pentest Tools List
- Black Hat Hacker Tools
- Hacker Tools Apk
- Pentest Tools List
- Computer Hacker
- Pentest Tools Github
- Pentest Tools
- Hacking Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools List
- Hackers Toolbox
- Blackhat Hacker Tools
- Pentest Tools Linux
- Game Hacking
- World No 1 Hacker Software
- Hacking Tools
- Blackhat Hacker Tools
- Hackers Toolbox
- Pentest Tools For Android
- Wifi Hacker Tools For Windows
- Wifi Hacker Tools For Windows
- Best Hacking Tools 2019
- Hack Tool Apk No Root
- Nsa Hacker Tools
- Hackrf Tools
- Free Pentest Tools For Windows
- Hack Tools 2019
- Hacking Tools
- Growth Hacker Tools
- Usb Pentest Tools
- Pentest Tools Download
- Hacker Tools Apk Download
- Pentest Tools Online
- Hacking Tools 2020
- New Hack Tools
- Hacker Tools
- Pentest Tools Kali Linux
- Hacking Tools Download
- Beginner Hacker Tools
- Hacker Tools List
- Hack Tools Mac
- Pentest Tools For Android
- Hacking Tools Pc
- How To Hack
- Pentest Tools Nmap
- Pentest Automation Tools
- Nsa Hack Tools Download
- Hacking Tools Kit
- Pentest Tools For Mac
- Nsa Hack Tools Download
- Pentest Tools For Windows
- Hack Tools Github
- Hack Tools For Ubuntu
- Pentest Tools Nmap
- Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Hacking Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Hacker Security Tools
- Hack Tool Apk
- Hack Rom Tools
- Hacker Search Tools
- Nsa Hacker Tools
- Computer Hacker
- Hacking Tools For Mac
- Pentest Tools Port Scanner
- Pentest Tools For Mac
- Physical Pentest Tools
- Hak5 Tools
- Kik Hack Tools
- Hacking Tools For Pc
- Usb Pentest Tools
- Hacking Tools Download
- Hack Website Online Tool
- Pentest Tools For Mac
- Pentest Tools Github
- Best Hacking Tools 2019
- Hacking Tools For Pc
- Hackers Toolbox
- Hacker Tools Mac
- Hackers Toolbox
- Hacking Tools Github
- Hacker Tools Apk
- Hacking Tools For Windows
- Hack Tools 2019
- Hack Tools Mac
- Pentest Box Tools Download
- Hack Tools For Games
- New Hack Tools
- Pentest Tools For Ubuntu
- Hack App
- Pentest Tools Android
- Pentest Tools Free
- Hacking Tools Github
- Hacker Tools For Pc
- Hacking Tools For Pc
- Hacking Tools And Software
- Hacking Tools Software
- Hacking Tools For Windows Free Download
- Blackhat Hacker Tools
- Pentest Tools Kali Linux
- Game Hacking
- Tools For Hacker
- Hacking Tools Free Download
- Hacking Tools For Mac
- What Are Hacking Tools
- Hacker Tool Kit
- Hacker Tools Free Download
- How To Make Hacking Tools
- Computer Hacker
- What Is Hacking Tools
- Pentest Tools Port Scanner
- Hacking Tools Mac
- What Is Hacking Tools
- Hak5 Tools
- Pentest Tools Subdomain
- Pentest Tools For Ubuntu
- Pentest Tools Subdomain
- New Hack Tools
- New Hack Tools
- Hacker Tools Github
- New Hack Tools
- Pentest Recon Tools
- Hack Tools
- Hacking Tools
- Hack Tools Github
- Hacker Hardware Tools
- Hacking Tools Kit
- Hacker Tools Software
- Hackrf Tools
- Hack Tools For Pc
- Hacker Security Tools
- Hacker Tools Free Download
- New Hacker Tools
- Computer Hacker
- Hacking Apps
- Hack Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools Download
- Hacking Tools Windows 10
- Hacker Hardware Tools
- Computer Hacker
- Pentest Tools Alternative
- Wifi Hacker Tools For Windows
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hack Tools Github
- Nsa Hack Tools
- Hacking Tools For Windows 7
- Nsa Hack Tools
- Best Hacking Tools 2020
- Hack Tools Github
- Hacker Tools Linux
- Hack Tool Apk No Root
- Hack Tools Pc
No comments:
Post a Comment