This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More articles
- What Is Hacking Tools
- Hacker Tools 2020
- How To Install Pentest Tools In Ubuntu
- Tools Used For Hacking
- New Hack Tools
- Hack And Tools
- Hack Tools Mac
- Pentest Tools List
- Hack Tools For Mac
- Hacking Tools Windows
- Hacking Apps
- Hacking Tools Mac
- Tools For Hacker
- Hack Tools 2019
- Hacker Tools Apk Download
- Pentest Recon Tools
- Hacker Tools Linux
- Hacking Tools For Mac
- Hacking Apps
- Hacker Tools Free Download
- Hack Tools For Pc
- Ethical Hacker Tools
- Hacker Tools For Windows
- What Are Hacking Tools
- Hack Tools
- Hack Tools For Windows
- Pentest Tools Android
- Kik Hack Tools
- Hack Apps
- Hack Tools For Mac
- Hacking Tools For Windows Free Download
- Hacker Tools For Pc
- Hack Tool Apk No Root
- Hack Tools Mac
- Hack Tools For Ubuntu
- Best Hacking Tools 2019
- Pentest Tools Bluekeep
- Hack Tools Download
- Top Pentest Tools
- Pentest Tools Linux
- Hacker Tool Kit
- Tools 4 Hack
- Best Hacking Tools 2019
- Game Hacking
- New Hack Tools
- Pentest Tools Subdomain
- Tools Used For Hacking
- Hacker Tools For Windows
- Pentest Tools Url Fuzzer
- Hack Apps
- Underground Hacker Sites
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Pc
- Hacking Tools Windows 10
- Pentest Tools Website Vulnerability
No comments:
Post a Comment