This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Continue reading
- Nsa Hack Tools Download
- Tools Used For Hacking
- Pentest Tools For Mac
- Pentest Tools Github
- Pentest Tools List
- Pentest Tools For Windows
- Hacker Tools For Pc
- Hack Tools For Pc
- Hacker Techniques Tools And Incident Handling
- Computer Hacker
- Hacking Tools Hardware
- Tools Used For Hacking
- Tools 4 Hack
- Hacking Tools
- Hacking Tools Github
- Game Hacking
- Hack Tools For Ubuntu
- Hacker Tools Linux
- Pentest Tools Tcp Port Scanner
- What Is Hacking Tools
- Pentest Tools Linux
- Computer Hacker
- Pentest Box Tools Download
- Hack Apps
- Hacking Tools Mac
- Tools 4 Hack
- Hacking Tools For Games
- Hack Tools 2019
- Hacking Tools For Windows 7
- Tools For Hacker
- Pentest Tools Apk
- Pentest Tools Windows
- Pentest Tools Apk
- How To Make Hacking Tools
- Hacking Tools And Software
- Pentest Tools Framework
- Hacking Tools For Pc
- Hacking Tools For Kali Linux
- Top Pentest Tools
- Hack Tools For Pc
- Kik Hack Tools
- Pentest Tools Linux
- Hacker
- Pentest Tools Download
- Hack App
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Windows
- How To Hack
- Tools Used For Hacking
- Hackers Toolbox
- Hacking Tools For Mac
- Hacker Tools For Windows
- Hack Tools Github
- Hacking Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools Pc
- Hacking Tools For Windows Free Download
- Install Pentest Tools Ubuntu
- Hack Tools
- Underground Hacker Sites
- Free Pentest Tools For Windows
- Pentest Tools List
- Hack Tools For Mac
- Pentest Tools Find Subdomains
- Pentest Tools For Ubuntu
- Hacking Tools For Windows 7
- How To Hack
- Hacker Tools Online
- Pentest Tools Kali Linux
- Hack Tools Pc
- Pentest Tools For Windows
- Hacking Tools Software
- Termux Hacking Tools 2019
- Hacking Tools Name
- Hack Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Windows
- Nsa Hacker Tools
- Best Hacking Tools 2019
Aucun commentaire:
Enregistrer un commentaire