This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Continue reading
- Best Pentesting Tools 2018
- Hacking Tools Pc
- Android Hack Tools Github
- Tools For Hacker
- Hack App
- Pentest Tools Apk
- Hacker Tools Hardware
- Hacker Tool Kit
- Hacking Tools Windows
- Hacker Tool Kit
- Hacker Tools Windows
- Hack And Tools
- Hackrf Tools
- Pentest Box Tools Download
- Hacking Tools Kit
- Hack Tools
- Pentest Tools Apk
- Kik Hack Tools
- Game Hacking
- Hacker Tools For Windows
- Hacking Tools Software
- Hacking Tools Github
- New Hacker Tools
- Hacker Tools For Mac
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows Free Download
- Hack Tool Apk
- Pentest Tools Website
- Black Hat Hacker Tools
- Hack Tools For Mac
- Hacker Tools Apk
- Hacker Tools Software
- Hacker Security Tools
- Hacking Tools Online
- Pentest Tools Review
- Pentest Tools Website Vulnerability
- Hacking Tools Software
- Pentest Tools Find Subdomains
- Hack Tool Apk No Root
- Kik Hack Tools
- Hack Tool Apk No Root
- Hacking Tools Windows
- Best Pentesting Tools 2018
- Pentest Tools Review
- Pentest Tools Open Source
- Nsa Hack Tools
- What Are Hacking Tools
- Pentest Automation Tools
- Hacker Tools
- Hack Tools Download
- Github Hacking Tools
- Pentest Tools Online
- Hacker Tools 2020
- Kik Hack Tools
- Hacking Tools For Pc
- Computer Hacker
- Pentest Tools Android
- Hack Tools Online
- Pentest Tools For Android
- Best Hacking Tools 2020
- Tools 4 Hack
- Hack Rom Tools
- Hack Tools Pc
- Ethical Hacker Tools
- Hacking Tools Kit
- Hacker Tools 2020
- Hack Tools 2019
- Hacker Tools Mac
- Termux Hacking Tools 2019
- Github Hacking Tools
- Hacking Tools For Kali Linux
- Hacker Tools Software
- Hacking Tools Windows 10
- Pentest Tools Apk
- Pentest Tools Windows
- Hack Tools For Pc
- Hacking Tools Free Download
- Pentest Tools Port Scanner
- Pentest Tools Url Fuzzer
- Pentest Tools Website
- Pentest Box Tools Download
- Nsa Hack Tools
- Hack Tool Apk No Root
- Easy Hack Tools
- Termux Hacking Tools 2019
- Hack Tools
- Hacking Tools Usb
- Top Pentest Tools
- Pentest Tools Kali Linux
- Hack Tool Apk No Root
- Pentest Tools Nmap
- Hacking Tools Usb
- Game Hacking
- Hacker Tools Mac
- Physical Pentest Tools
- Hacking Tools For Mac
- Hack Tools 2019
- Easy Hack Tools
- Pentest Recon Tools
- Black Hat Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Install Pentest Tools Ubuntu
- Hacking Tools Online
- Beginner Hacker Tools
- Hacker Tools Apk
- Pentest Tools Free
- Pentest Tools Framework
- Hacker Techniques Tools And Incident Handling
- World No 1 Hacker Software
- Hacking Tools For Mac
- Pentest Tools Review
- Growth Hacker Tools
- Hacking Tools Hardware
- World No 1 Hacker Software
- Hack Tools
- Hack Tools 2019
- Hacker Tools Online
- Hacking Tools For Games
- Hacker Tools
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Hacking Tools Software
- Beginner Hacker Tools
- Hack Tools Download
- Hacking Tools Kit
- Hacking Tools For Mac
- Hacking Apps
- Bluetooth Hacking Tools Kali
- Hack Tools For Ubuntu
- Hacker Tools For Pc
- Hacking Tools Name
- Hacker Search Tools
- Hacker Tools Apk Download
- Hacking Tools Windows 10
- Pentest Tools Bluekeep
- Pentest Tools Windows
- How To Make Hacking Tools
- Hacking Tools Windows
- Hack App
- New Hacker Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Windows
- Hacking Tools For Games
- Hacking Tools For Mac
- How To Hack
- Black Hat Hacker Tools
- Pentest Tools Android
- Hack Tools
No hay comentarios:
Publicar un comentario