This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related links
- Hacker Tools For Pc
- New Hacker Tools
- Best Pentesting Tools 2018
- Hacker Tools For Pc
- Hack Tools For Pc
- What Are Hacking Tools
- Hacking Tools Usb
- Hacking Tools For Windows
- Hacking Tools For Pc
- Pentest Tools Kali Linux
- Hacking Tools For Windows
- Hack Tools
- Pentest Tools Framework
- How To Install Pentest Tools In Ubuntu
- Physical Pentest Tools
- Pentest Tools Nmap
- Computer Hacker
- Hacker Hardware Tools
- Pentest Tools Windows
- Hacking Tools For Games
- Pentest Reporting Tools
- Pentest Tools Free
- Pentest Tools Open Source
- Hack Apps
- Hack Tools
- Hacker Tools For Mac
- Hacking Tools For Windows
- Hacking Tools Name
- New Hack Tools
- Hacking Tools For Kali Linux
- Pentest Reporting Tools
- Hacking Tools For Pc
- Hacker Tools Apk Download
- Pentest Tools Windows
- What Are Hacking Tools
- World No 1 Hacker Software
- Ethical Hacker Tools
- Hacker Tools
- Hack Website Online Tool
- Hacking Tools For Windows Free Download
- Pentest Tools Android
- Hack Tools Download
- Pentest Tools Tcp Port Scanner
- How To Make Hacking Tools
- Hacking Tools For Kali Linux
- Usb Pentest Tools
- Hacks And Tools
- Hacker Tools Apk Download
- Pentest Tools Framework
- Pentest Tools For Android
- Game Hacking
- Pentest Tools For Android
- Hacking Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacking Tools Software
- Hacker Tools 2019
- Hacker Hardware Tools
- Hacker Tools
- What Is Hacking Tools
- Best Pentesting Tools 2018
- Hack App
- Hacking Tools And Software
- World No 1 Hacker Software
- Pentest Tools Review
- Tools Used For Hacking
- Ethical Hacker Tools
- Pentest Tools List
- Hack Tools For Pc
- Tools 4 Hack
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Software
- Hacking Tools For Windows 7
- Pentest Tools For Mac
- Pentest Tools Alternative
- Pentest Tools Find Subdomains
- Tools 4 Hack
- Pentest Tools Download
- Hacking Tools Software
- Hacker Tools Apk Download
- Tools For Hacker
- Hacker Techniques Tools And Incident Handling
- Hack Tools Download
- Hacking Tools
- Hacks And Tools
- Blackhat Hacker Tools
- Pentest Tools List
- Hack Tools Mac
- Best Hacking Tools 2019
- Hacking App
- Hacking Tools Free Download
- Pentest Tools Android
- Hack Tools Online
- Hack And Tools
- Pentest Automation Tools
- Hacking Tools Online
- Hacker
- Hacker Tool Kit
- Hack Tools Download
- Hacker Tool Kit
- Hacker Tools For Windows
- Game Hacking
- Hackers Toolbox
- Pentest Tools Bluekeep
- Pentest Tools Download
- Hacking Tools Windows
- Hacking Tools Free Download
- Pentest Recon Tools
- Pentest Tools Windows
- Pentest Tools Alternative
- Wifi Hacker Tools For Windows
- Hack Tools For Pc
- Ethical Hacker Tools
- Pentest Tools Framework
- Pentest Tools Windows
- Hacking Tools Free Download
- Pentest Tools Free
- Blackhat Hacker Tools
- Pentest Tools Github
- Hack Tools Online
- Hacking Tools Github
- Pentest Tools Find Subdomains
- Tools Used For Hacking
- Hack App
- Pentest Tools Open Source
- Bluetooth Hacking Tools Kali
- Android Hack Tools Github
- Hacking Tools And Software
- Bluetooth Hacking Tools Kali
- Hacker Tools Free
- Hack App
- Hacker Techniques Tools And Incident Handling
- How To Hack
- Pentest Tools Bluekeep
- Hacker Tools For Pc
- Top Pentest Tools
- Hack App
- Hack Tools Download
- Pentest Tools Subdomain
- Hacking Tools For Beginners
- Hack App
- Pentest Tools For Windows
- Hacker Hardware Tools
- Hacking Tools Free Download
- Hack Tool Apk
- Pentest Tools Download
- Pentest Tools Apk
- Hacking Apps
- Hacker Tools Free Download
- Pentest Tools For Mac
- Hack Tool Apk No Root
- Hack Tools 2019
- Hacking Tools Windows
- Pentest Tools
- Pentest Box Tools Download
- Blackhat Hacker Tools
- Hacker Tools Online
- Tools Used For Hacking
- Pentest Tools Download
- Hack Tools For Pc
- Hack Tools Pc
- Android Hack Tools Github
- Pentest Tools Website
- Hack Apps
Aucun commentaire:
Enregistrer un commentaire