This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hacker Tools 2019
- Hacking Tools Mac
- Hacker Security Tools
- Physical Pentest Tools
- Hack Tools For Windows
- Hacking Tools 2020
- Hacker Search Tools
- Github Hacking Tools
- Hack Rom Tools
- Pentest Automation Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Port Scanner
- Hacking Tools Online
- Best Pentesting Tools 2018
- Hacker Tools Online
- Hak5 Tools
- Hacking Tools 2020
- Pentest Tools For Ubuntu
- Pentest Tools
- Hacking Tools For Kali Linux
- Hacking Tools 2019
- Hacking Tools Hardware
- Hack And Tools
- Hacker Tools For Pc
- Hacking App
- What Is Hacking Tools
- Hacking Tools Name
- Hacking Tools Mac
- Hacking Tools Windows 10
- Hacker Tools For Pc
- Hacking Tools Kit
- Hak5 Tools
- Pentest Tools Online
- Easy Hack Tools
- Beginner Hacker Tools
- Hacker Tools 2019
- Hacker Security Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools Mac
- What Is Hacking Tools
- Pentest Recon Tools
- Nsa Hack Tools
- Hacker Tools 2020
- Pentest Tools Free
- Pentest Tools Tcp Port Scanner
- Termux Hacking Tools 2019
- Hacker Tools 2019
- Hack Tool Apk No Root
- Hacking Tools For Windows Free Download
- Hacker Tools For Pc
- Growth Hacker Tools
- New Hacker Tools
- Pentest Reporting Tools
- Hacker Tools Apk
- Pentest Tools For Ubuntu
- Hacker Security Tools
- Pentest Tools Framework
- Hacking Apps
- Hacking Tools Windows
- Hack Tools Mac
- Hacker
- Pentest Tools For Android
- How To Make Hacking Tools
- Hacker Tools List
- Hack Tools
- Hacker Tools List
- Hacking Tools For Windows
- Hacker Tools Free
- Wifi Hacker Tools For Windows
- Blackhat Hacker Tools
- Pentest Reporting Tools
- Wifi Hacker Tools For Windows
- Hacker Tools For Pc
- Hacker Tools Github
- Hack Tool Apk No Root
- Hack Tools For Mac
- Usb Pentest Tools
- Pentest Tools Free
- Hack Rom Tools
- Hacking Tools Name
- Hack Tools For Pc
- Hacking Tools And Software
- Hacker Tools Free
- Kik Hack Tools
- Hack Tool Apk
- Pentest Tools Kali Linux
- Pentest Tools For Windows
- Hacker Tools Mac
- Hacker Security Tools
- Hackers Toolbox
- Hacking Tools Software
- Hack Tool Apk
- Pentest Box Tools Download
- What Are Hacking Tools
- Nsa Hack Tools
- Hack Tools For Mac
- Hacking Tools 2019
- Hack And Tools
- Tools For Hacker
- Pentest Tools Linux
- Hacker Tools Hardware
- Hacking Tools Download
- Best Hacking Tools 2019
- Hacker Tools For Mac
- Hacker Hardware Tools
- Pentest Tools Linux
- Hacker Tools Online
- Kik Hack Tools
- Pentest Tools Free
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows Free Download
- Hacking Tools For Games
- Pentest Tools For Windows
- How To Make Hacking Tools
- Hacking Tools For Games
- Hacking Tools 2020
- Hack Tools
- Hack Tools Mac
- Nsa Hacker Tools
- Pentest Tools Linux
- Hacks And Tools
- New Hacker Tools
- Hack App
- Tools 4 Hack
- Pentest Tools Apk
- Pentest Tools Alternative
- Pentest Tools Framework
- Pentest Tools Online
- Nsa Hack Tools
- Github Hacking Tools
- Black Hat Hacker Tools
- Wifi Hacker Tools For Windows
- Growth Hacker Tools
- Hacker Tool Kit
- Hack Rom Tools
- Best Hacking Tools 2020
- Hack Tools For Windows
- Pentest Tools Free
- Hacking Tools For Windows 7
- Pentest Automation Tools
- Pentest Reporting Tools
- Best Hacking Tools 2020
- Hacking Tools 2019
- Hacker Tools
- Hacking Tools Online
- Hacking Tools For Kali Linux
- Pentest Tools Download
- Hacker Tool Kit
- Hacking Tools Download
- Hack Tools Github
- Growth Hacker Tools
- How To Hack
- Hack Tools For Windows
- Hacker Tools Linux
- Termux Hacking Tools 2019
- Hacker Tools For Ios
- Hacking Tools Download
- Hacker Tools Mac
- Pentest Tools For Windows
- Pentest Tools Subdomain
- Hacker Tools Mac
- Nsa Hack Tools Download
- World No 1 Hacker Software
- Hack Tools Pc
- Tools For Hacker
- Pentest Tools Website Vulnerability
- Hacker Tools Free
- Hackers Toolbox
- Bluetooth Hacking Tools Kali
No comments:
Post a Comment