This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Read more
- Hacker Tools 2020
- Pentest Tools For Android
- Pentest Automation Tools
- Hack Tools
- Termux Hacking Tools 2019
- Tools For Hacker
- Hacking Tools Software
- Pentest Tools Free
- Hacker Tools For Mac
- Hacker
- Black Hat Hacker Tools
- Pentest Tools For Android
- Hackrf Tools
- Free Pentest Tools For Windows
- Hacking Tools 2019
- Hacker Tools Mac
- Game Hacking
- Wifi Hacker Tools For Windows
- Hak5 Tools
- Pentest Tools Framework
- Pentest Tools Free
- Pentest Tools Website
- Hacker Tools List
- Pentest Tools For Android
- Hacking Tools And Software
- Hacking Tools Github
- Pentest Tools Url Fuzzer
- Pentest Reporting Tools
- Hacking Tools Pc
- Pentest Tools Kali Linux
- Install Pentest Tools Ubuntu
- Hack Tool Apk No Root
- Pentest Tools Online
- Hacker Tools Apk Download
- Pentest Tools List
- Hacking Tools Pc
- Hack Tools
- Hackers Toolbox
- Blackhat Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools 2020
- Beginner Hacker Tools
- Pentest Tools Bluekeep
- Pentest Tools List
- Beginner Hacker Tools
- Hacker Tools For Mac
- Blackhat Hacker Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2019
- Nsa Hacker Tools
- What Are Hacking Tools
- Hacking Tools Download
- Hacking Tools For Windows
- Best Hacking Tools 2019
- Hack Tools For Pc
- Hacking Tools For Mac
- Pentest Recon Tools
- Hack Tools 2019
- Hacking App
- Hak5 Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Website Vulnerability
- Pentest Tools Nmap
- Hacker Techniques Tools And Incident Handling
- Pentest Tools For Mac
- Best Hacking Tools 2019
- Hacking Tools Windows
- Hack Rom Tools
- Pentest Tools Kali Linux
- Pentest Tools For Android
- Nsa Hacker Tools
- Hacking Tools For Windows 7
- Pentest Tools Download
- Pentest Box Tools Download
- Pentest Tools Online
- Hacking Tools For Mac
- Pentest Tools For Android
- Pentest Tools Apk
- Hacking Tools For Beginners
- Pentest Box Tools Download
- Hacker Hardware Tools
- What Is Hacking Tools
- Nsa Hack Tools
- Hacker Hardware Tools
- Pentest Tools Android
- Nsa Hacker Tools
- Hackers Toolbox
- Hacker Tools List
- Hacker Security Tools
- Pentest Tools Find Subdomains
- Install Pentest Tools Ubuntu
- Hacker Tools Hardware
- Pentest Tools Open Source
- Hack Tools 2019
- Hacking Tools 2020
- Hack Tools Online
- Underground Hacker Sites
- Hacker Tools For Mac
- Pentest Tools Nmap
- Hacker Tools 2020
- Hacking Tools Free Download
- Beginner Hacker Tools
- Pentest Tools For Ubuntu
- Hack And Tools
- Pentest Tools Kali Linux
- Hack Tools For Windows
- Hack Tools Github
- Hacking Tools Pc
- Hacker Tools Software
- What Are Hacking Tools
- Hack Tools For Mac
- Hack Tools 2019
- Hack Tools 2019
- Hacker Tools Apk Download
- Hacking Tools For Beginners
- Hacking Tools Github
- Hacker Tools 2019
- Hacking Tools For Games
- Pentest Tools For Ubuntu
- Pentest Tools Open Source
- Bluetooth Hacking Tools Kali
- Hacker Tools For Pc
- Hack Tools Github
- Hacker Tools Linux
- Hacking Tools For Games
- Hacking Tools Online
- Free Pentest Tools For Windows
- Hack Tools Github
- Hacker Tools For Pc
- Pentest Tools Website Vulnerability
- Pentest Tools Review
- Hacking Tools
- Pentest Tools Github
- How To Hack
- Hacker Tools Hardware
- Hack And Tools
- Hacker Tools For Mac
- Pentest Tools For Ubuntu
- Hacker
- What Is Hacking Tools
- Pentest Tools Port Scanner
- Pentest Tools Apk
- Bluetooth Hacking Tools Kali
- Hack App
- Pentest Tools Find Subdomains
- Hacking Tools Name
- New Hack Tools
- Pentest Automation Tools
No hay comentarios:
Publicar un comentario