This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related articles
- Hacking Tools Software
- Best Hacking Tools 2020
- Hacker Tools
- Hack Tools For Pc
- Pentest Tools Apk
- Hacking Tools For Windows Free Download
- Hacking Tools Software
- Pentest Tools
- What Are Hacking Tools
- Pentest Tools Review
- Hacking Tools For Windows
- Hacking Tools For Windows
- Hack Tools Mac
- Hacker Tools Software
- Hack Apps
- Hacking Tools Free Download
- Hacking Tools Name
- How To Install Pentest Tools In Ubuntu
- Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Hack Tools For Mac
- Pentest Tools Framework
- Free Pentest Tools For Windows
- Hack Tools 2019
- Hacker Tools 2020
- Hacking Tools 2020
- Hacker Tools Windows
- Hacking Tools Usb
- Hacker Tools For Pc
- Hack Tool Apk
- Pentest Tools For Mac
- Tools Used For Hacking
- Tools Used For Hacking
- Hacker Tools For Ios
- Hacking Tools Windows 10
- Pentest Tools Apk
- Hacker Tools Windows
- Bluetooth Hacking Tools Kali
- Pentest Tools Alternative
- Ethical Hacker Tools
- World No 1 Hacker Software
- Computer Hacker
- Hack App
- Android Hack Tools Github
- Pentest Automation Tools
- Pentest Tools Url Fuzzer
- Hacking Tools Software
- Hacking Apps
- Hack Tools 2019
- Pentest Tools Website
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Free
- Hacker Tools Free
- Hacker Tools
- Pentest Tools Nmap
- Bluetooth Hacking Tools Kali
- Hacker Tools Hardware
- Pentest Tools Alternative
- Best Pentesting Tools 2018
- Hacking Tools For Beginners
- Pentest Tools Tcp Port Scanner
- Github Hacking Tools
- Hack Rom Tools
- Pentest Box Tools Download
- Hacker
- Hacking Tools Name
- Hacker Tools Linux
- Pentest Reporting Tools
- Best Hacking Tools 2019
- Pentest Tools Review
- Hacking Tools For Kali Linux
- Hacker Tools 2019
- Pentest Tools Framework
- Wifi Hacker Tools For Windows
- Hacker Tools List
- Hack Tools Download
- Pentest Tools Website
- Hackrf Tools
- Pentest Tools Find Subdomains
- Hack Tools For Games
- Black Hat Hacker Tools
- World No 1 Hacker Software
- New Hack Tools
- Pentest Tools Website
- Hack Tools
- Best Pentesting Tools 2018
- Pentest Tools Port Scanner
- Hacking Tools Pc
- Hacking Tools For Pc
- Hack Tool Apk No Root
- Hacker Tools For Ios
- Hacking Tools For Windows Free Download
- How To Hack
- Pentest Box Tools Download
- Beginner Hacker Tools
- Underground Hacker Sites
- Hacker Tools Apk Download
- Hack Tools Online
- Pentest Tools List
- Ethical Hacker Tools
- Pentest Tools List
- Underground Hacker Sites
- Growth Hacker Tools
- Hacker Tools Hardware
- Growth Hacker Tools
- Pentest Box Tools Download
- Pentest Tools Kali Linux
- Pentest Recon Tools
- Hack Tool Apk No Root
- Hacker Tools Hardware
- Nsa Hack Tools Download
- Hack Tools Download
- Pentest Tools Download
- How To Make Hacking Tools
- Usb Pentest Tools
- Hacking Tools For Pc
- Bluetooth Hacking Tools Kali
- Black Hat Hacker Tools
- Hacking Tools For Mac
- Hacking Tools 2019
- Free Pentest Tools For Windows
- Hacking Tools Pc
- Wifi Hacker Tools For Windows
- Hacking Tools Kit
- What Are Hacking Tools
- Hacking Tools Hardware
- Pentest Box Tools Download
- Hacker Tools Free Download
- World No 1 Hacker Software
- Pentest Tools For Windows
- Hacker Tools Mac
- Ethical Hacker Tools
- Pentest Tools List
- Best Hacking Tools 2019
- Hacker Tools
- Hacker Tools Windows
- Hack Tools Github
- Best Hacking Tools 2020
- World No 1 Hacker Software
- Pentest Automation Tools
- Hacker Tools 2020
- Hacking App
- Pentest Tools List
- Pentest Tools For Ubuntu
0 comments:
Post a Comment