This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related word
- Hak5 Tools
- What Is Hacking Tools
- Hacker Tools For Ios
- Pentest Tools Website
- Nsa Hack Tools
- Pentest Tools
- Pentest Tools Bluekeep
- Hacker Tools Software
- Hacking Tools Usb
- Hacking Tools Pc
- Hacking Tools Download
- Computer Hacker
- Tools 4 Hack
- Hacks And Tools
- Hacker Tools For Mac
- How To Make Hacking Tools
- Hacking Tools Mac
- Hack Tools For Pc
- Hacker Hardware Tools
- Hacker Tools 2019
- Hack Tools For Ubuntu
- Pentest Tools Github
- Hacking Tools Download
- Pentest Tools Github
- Pentest Tools Url Fuzzer
- Hacking Tools Usb
- Pentest Tools For Windows
- Hack Website Online Tool
- Growth Hacker Tools
- Hacking Tools And Software
- Kik Hack Tools
- Kik Hack Tools
- Hacking Tools Online
- Hack Website Online Tool
- Pentest Box Tools Download
- Hack Tools For Ubuntu
- Hacking Tools 2019
- Best Hacking Tools 2019
- Pentest Reporting Tools
- Termux Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Pc
- Blackhat Hacker Tools
- Pentest Tools Open Source
- Hacking Tools Name
- Hackers Toolbox
- Hack And Tools
- Ethical Hacker Tools
- How To Make Hacking Tools
- Hack And Tools
- Pentest Tools Nmap
- Beginner Hacker Tools
- Hacking Tools 2019
- Hacking Tools Usb
- Hack App
- Hack Tools For Mac
- Pentest Tools Subdomain
- Pentest Automation Tools
- Pentest Tools Website
- New Hack Tools
- Hack Tools 2019
- Hack Rom Tools
- Pentest Tools Framework
- Hack Tools
- Pentest Tools Linux
- Hacker Hardware Tools
- Pentest Tools
- Pentest Tools Linux
- Pentest Tools For Mac
- Hack Apps
- Hacking Tools Online
- Hack Tool Apk
- Hacker Tools Free
- Pentest Tools Android
- Pentest Tools Subdomain
- Hacking Tools 2020
- Hack Tools Github
- Hacking Tools Download
- How To Make Hacking Tools
- Hacking Tools For Kali Linux
- Hacker Tools 2019
- Hacker Tools Online
- Best Hacking Tools 2019
- Computer Hacker
- Best Pentesting Tools 2018
- Hacker Tools Software
- Hack Tools Download
- Hacker Tools Github
- Hacking Apps
- Hacker Tools Mac
- Hackers Toolbox
- Pentest Tools Tcp Port Scanner
- Hacker Tools Online
- Pentest Tools Github
- Hacking Tools Online
Nenhum comentário:
Postar um comentário