This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related news
- Hacking Tools Kit
- Underground Hacker Sites
- Hacking Tools 2019
- Pentest Tools For Mac
- Growth Hacker Tools
- Hack App
- Nsa Hack Tools Download
- Free Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacker Tools 2019
- Pentest Tools For Ubuntu
- Pentest Tools Android
- Pentest Tools Subdomain
- Kik Hack Tools
- Pentest Tools Online
- Hacking Tools For Pc
- Beginner Hacker Tools
- Pentest Tools Find Subdomains
- Hack Tools 2019
- Android Hack Tools Github
- Hack Tools For Pc
- Beginner Hacker Tools
- Tools Used For Hacking
- What Is Hacking Tools
- Tools 4 Hack
- Hacker Tools For Ios
- Hacker Tools Linux
- Hacking Tools Mac
- Hacker Tools Free Download
- Hacker Tools Github
- Pentest Tools Bluekeep
- Hacker Tool Kit
- Nsa Hack Tools
- Pentest Tools Free
- Hack Tools For Mac
- Pentest Tools Bluekeep
- Pentest Tools Download
- Android Hack Tools Github
- How To Hack
- Hacking App
- Hack Tools Pc
- Install Pentest Tools Ubuntu
- Pentest Tools
- Best Hacking Tools 2019
- What Are Hacking Tools
- Hack App
- Hacker Tools 2020
- Hack Tools For Games
- Pentest Tools Tcp Port Scanner
- Hacker Tools 2019
- Hacking Apps
- Hacker Hardware Tools
- Hak5 Tools
- Hacking Tools For Windows 7
- Pentest Tools Online
- Hackers Toolbox
- New Hack Tools
- Hacking Tools For Kali Linux
- New Hack Tools
- Top Pentest Tools
- Hacker Tools Apk Download
- Hacking Tools Hardware
- Hacking Tools For Windows
- Hacker Tool Kit
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Windows 7
- Hak5 Tools
- Game Hacking
- Hack Tools For Mac
- Hack Tool Apk
- Hack Tools
- Pentest Reporting Tools
- Pentest Tools Website Vulnerability
- Pentest Reporting Tools
- Hacker Tools Linux
- Hacker Tools Free
- Hackrf Tools
- Hacker Tools Github
- How To Hack
- Hacker Tools
- Hacker Tools Free Download
- Hacking Tools Pc
- Hacking Tools Windows
- Hacking Tools Free Download
- Hack Tool Apk
- Hacker Tools For Mac
- Hack Tools Github
- How To Make Hacking Tools
- Blackhat Hacker Tools
- Termux Hacking Tools 2019
- Hacker Tools Hardware
- Hacker Tools Linux
- Tools 4 Hack
- Pentest Tools Website Vulnerability
- Free Pentest Tools For Windows
- Hack Tool Apk No Root
- Hak5 Tools
- Hacking Tools For Windows
- Hack Tools
- What Is Hacking Tools
- Pentest Tools Download
- Hacking Tools
- Underground Hacker Sites
- How To Hack
- Hacking Tools 2020
- Hacking Tools Free Download
- Hacking Tools For Pc
- Pentest Tools Free
- Hacker Hardware Tools
- How To Hack
- Hacking Tools For Pc
- Top Pentest Tools
- Pentest Tools Website Vulnerability
- Hacker Tools For Pc
- Pentest Tools For Mac
- Ethical Hacker Tools
- Blackhat Hacker Tools
- Hack Tools Mac
- Pentest Tools Nmap
- Easy Hack Tools
- Black Hat Hacker Tools
- Install Pentest Tools Ubuntu
- Pentest Reporting Tools
- Hacker Tools Online
- Hack Tools 2019
- Top Pentest Tools
- Hacking Tools Software
- What Are Hacking Tools
- Hacker Tools List
- Pentest Tools Linux
- Nsa Hack Tools
- Hacker Tools Github
- Best Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Hack App
- Hack Website Online Tool
- Hacker Tools 2020
- Hack Tool Apk No Root
- Top Pentest Tools
- Nsa Hack Tools
- Pentest Tools Download
- Bluetooth Hacking Tools Kali
- Black Hat Hacker Tools
- Nsa Hack Tools
- Hacker
- Pentest Tools For Android
- Hacking Tools For Pc
No comments:
Post a Comment