This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related links
- Hacker Tools Windows
- Pentest Tools Framework
- Pentest Tools Kali Linux
- Hacking Tools Online
- Hack Tools For Ubuntu
- Hacker Tools Apk Download
- Hacking Tools Kit
- Hacking Tools Online
- Hacker Tools Linux
- Hack Tools For Windows
- Hack Rom Tools
- Hacking Tools For Windows 7
- Pentest Tools Review
- Tools 4 Hack
- Pentest Tools Url Fuzzer
- Pentest Automation Tools
- Hacking Tools And Software
- Bluetooth Hacking Tools Kali
- Hack And Tools
- Hacker Tools Free
- Hacking Tools Github
- Pentest Tools Kali Linux
- Nsa Hack Tools
- Hacker Tools Hardware
- Hacking Tools For Windows
- Hacker Tools Free
- Underground Hacker Sites
- Nsa Hack Tools
- Hacking Tools Name
- Hacker Tools Free Download
- Hacking Tools For Beginners
- Hack Tools Download
- Hacker Tools Apk Download
- Black Hat Hacker Tools
- Pentest Tools For Ubuntu
- Hacker Tools Linux
- Pentest Tools Url Fuzzer
- Hacking Tools 2019
- Hacker Tools Free
- Hacking Tools And Software
- Hacker Tools Free
- Hacks And Tools
- Hack Tools Online
- Hacker Tools List
- Best Hacking Tools 2019
- Top Pentest Tools
- Hack Tools Online
- Pentest Tools Download
- Pentest Tools For Windows
- Hacking Tools Usb
- Pentest Tools Port Scanner
- Hacking Tools Mac
- Hack Tools For Mac
- Bluetooth Hacking Tools Kali
- Hack Tools Mac
- Hacking Tools Pc
- Hack Tools For Games
- Android Hack Tools Github
- Hacks And Tools
- Hacking Tools For Windows
- Hacking Tools Kit
- Hack Tools For Pc
- Hacker Tools Linux
- Hacker Tools Free
- Hacker Hardware Tools
- Computer Hacker
- Hacker Tools For Mac
- Hacking Tools Usb
- Computer Hacker
- Hacking Tools Windows 10
- Pentest Tools For Mac
- Wifi Hacker Tools For Windows
- Hack Tools Mac
- Pentest Reporting Tools
- Hacking Tools For Windows
- Hack Tools Online
- Pentest Reporting Tools
- Hack Tools For Mac
- Hacking Tools 2019
- Top Pentest Tools
- Android Hack Tools Github
- Hacker Tools Hardware
- Hack Tools
- What Is Hacking Tools
- Hacker Tools Hardware
- Hacker Tools
- Pentest Recon Tools
- Pentest Tools Find Subdomains
No hay comentarios:
Publicar un comentario