This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hacker Tools For Mac
- Pentest Tools Website
- Hacking Tools Download
- Hacker Tools Free
- Github Hacking Tools
- Hacking Tools For Windows 7
- Hacker Tools Hardware
- Best Hacking Tools 2019
- Hack App
- Hacking Tools And Software
- Hacker Tools Apk
- Hack Website Online Tool
- Termux Hacking Tools 2019
- Hacks And Tools
- Hack Tools Mac
- Pentest Tools For Mac
- Pentest Tools Open Source
- Usb Pentest Tools
- Hacker Tool Kit
- Hackers Toolbox
- Hackers Toolbox
- Hacks And Tools
- Pentest Tools Subdomain
- Pentest Tools Free
- Hacking Tools Kit
- Pentest Tools Nmap
- Hacker Search Tools
- Best Hacking Tools 2020
- Hacker Tool Kit
- Hacker Tools 2020
- Best Hacking Tools 2020
- Hack Tool Apk
- Hack Rom Tools
- Hacker Tools Free
- Pentest Reporting Tools
- Hacker Tools Software
- Hacking Tools For Beginners
- Hacking Tools Hardware
- Hacking Tools And Software
- Hack Tools
- Hack Rom Tools
- Pentest Tools Url Fuzzer
- Hack Tools Pc
- Ethical Hacker Tools
- Hacker Tools Apk Download
- Pentest Tools For Windows
- Hacking Tools For Mac
- Bluetooth Hacking Tools Kali
- Hacking Tools Windows 10
- Pentest Tools Url Fuzzer
- Pentest Tools For Android
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Subdomain
- Nsa Hacker Tools
- Hacking Tools For Kali Linux
- Hak5 Tools
- Nsa Hack Tools
- Pentest Tools Subdomain
- Hack App
- Pentest Tools Find Subdomains
- How To Install Pentest Tools In Ubuntu
- Hacker Techniques Tools And Incident Handling
- Hack Tools
- Hacking Tools For Mac
- Pentest Tools Apk
- Hacking Tools Mac
- Hacking Tools Kit
- Growth Hacker Tools
- Hacker Tools Software
- Hacking Tools For Windows
- How To Make Hacking Tools
- Hacker Tool Kit
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Tools For Hacker
- Pentest Tools For Android
- Hack Rom Tools
- Hacking Tools Kit
- Hacking Tools For Windows Free Download
- Hacking Tools And Software
- Nsa Hack Tools Download
- Hacking Tools For Windows Free Download
- Pentest Tools Download
- Hack Tools Pc
- Best Hacking Tools 2020
- What Is Hacking Tools
- Hacking Tools For Kali Linux
- Bluetooth Hacking Tools Kali
- Hacking Tools Windows
- Hack Apps
- Pentest Tools Framework
- Github Hacking Tools
- Hacker
- Hacking Tools For Beginners
- Termux Hacking Tools 2019
- Hack Apps
- Hacker Tools For Mac
- Hacking App
- Hack App
- Hacking Tools Mac
- Hacking Tools Online
- Pentest Tools
- Hacker Tools Hardware
- World No 1 Hacker Software
- Pentest Tools Url Fuzzer
- Hacking Tools For Windows 7
- Pentest Reporting Tools
- Hack Tools Download
- Hacker Tools Software
- Pentest Tools Port Scanner
- Hack Tools Mac
- Hacking Tools Mac
- Github Hacking Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Subdomain
- Pentest Tools Kali Linux
- Growth Hacker Tools
- Kik Hack Tools
- Growth Hacker Tools
- Hacker Tools For Pc
- Tools 4 Hack
- Hacking Tools Name
- Hacking Tools For Windows
- Hacking Apps
- Pentest Tools Android
- Hacker Tools For Pc
- Easy Hack Tools
- Hack Website Online Tool
- Hack Tools
- Tools 4 Hack
- Hacking Tools For Kali Linux
- Hacking Tools Windows
- Hack Tools
- Hacking Tools 2019
- Hacking Tools For Mac
- Hacker Security Tools
- Pentest Tools Alternative
- Hacking Tools Pc
- Pentest Tools Url Fuzzer
- Hacker Tools Apk Download
- Pentest Tools Nmap
- Hack App
No hay comentarios:
Publicar un comentario