This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Pentest Tools For Windows
- Hacker Tools Apk
- What Is Hacking Tools
- Hacker Tools Free Download
- Pentest Tools Find Subdomains
- Hack Tools For Mac
- Pentest Tools Framework
- Hacker Hardware Tools
- Hacker Tools Free
- Hacker Tools Windows
- Ethical Hacker Tools
- Hacking Tools 2019
- Pentest Tools For Windows
- Hack Tools For Games
- Best Pentesting Tools 2018
- Nsa Hacker Tools
- Wifi Hacker Tools For Windows
- Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking Apps
- Ethical Hacker Tools
- Pentest Tools Find Subdomains
- Bluetooth Hacking Tools Kali
- Pentest Box Tools Download
- Tools Used For Hacking
- Hacker Tools Mac
- Pentest Tools Url Fuzzer
- Hacking Tools Windows 10
- Hacker Tools For Ios
- Hacking Tools Online
- Hacker Tools 2019
- Hacks And Tools
- Hacking App
- Beginner Hacker Tools
- Hack Tools For Ubuntu
- Hacking Tools Name
- Nsa Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Windows
- Hacking Tools Usb
- Hacks And Tools
- Pentest Tools Bluekeep
- Hacker Tools For Mac
- Hacking Tools For Windows Free Download
- Hack Rom Tools
- Hacking Tools And Software
- Hacker Tools Free Download
- Hacking Tools Name
- Pentest Tools
- Hacking Tools Github
- Black Hat Hacker Tools
- Hack Tools 2019
- Pentest Tools List
- Pentest Tools Online
沒有留言:
發佈留言