This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related articles
- Hack Tools
- Hacker Techniques Tools And Incident Handling
- Tools For Hacker
- Hacker Tool Kit
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Pc
- Pentest Box Tools Download
- Hacking Tools Software
- Pentest Tools Website
- Hacker Tools Mac
- Hack Tools For Windows
- Hack Tools Download
- Hack Website Online Tool
- Hack Tool Apk No Root
- Pentest Tools For Ubuntu
- Hack Tools For Windows
- Nsa Hack Tools
- Black Hat Hacker Tools
- Hacking Tools Pc
- Hackers Toolbox
- Hacking Tools Mac
- Hacking Tools Windows 10
- Hacking Tools And Software
- Hacker Tools Github
- New Hacker Tools
- Hacking Tools Mac
- Pentest Tools Framework
- Termux Hacking Tools 2019
- Hacking Tools Online
- Nsa Hacker Tools
- Hacker Tools For Ios
- Hacking Tools 2020
- Physical Pentest Tools
- Hack Apps
- Hacking Tools Software
- Hacking Tools Pc
- Pentest Tools Open Source
- Pentest Tools Review
- Hack Tools Mac
- Wifi Hacker Tools For Windows
- Hack Website Online Tool
- Hacker Tools Hardware
- Hacking Apps
- Best Hacking Tools 2019
- Hacker Tools For Windows
- Pentest Tools Linux
- Best Pentesting Tools 2018
- Hacking Tools Download
- Pentest Reporting Tools
- Beginner Hacker Tools
- Hack Tool Apk No Root
- Hacking Tools 2020
- Hacking Tools For Games
- Pentest Tools Android
- Black Hat Hacker Tools
- Hack Tools Download
- Hack Tools 2019
- Tools Used For Hacking
- Growth Hacker Tools
- Blackhat Hacker Tools
- Hacker
- Hacker Tool Kit
- Hack Apps
- Hacker Tools Apk Download
- Best Hacking Tools 2020
- Pentest Tools For Ubuntu
- Pentest Automation Tools
- Hacking Tools For Beginners
- Pentest Tools Online
- Hacker Tools
- Hacker Tools Apk Download
- Tools 4 Hack
- Hacking Tools Pc
- Hacking Tools Usb
- Hacker
- Hacker Tools Hardware
- Hack Tools For Pc
- Hacker Tools 2020
- Easy Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hack Rom Tools
- Pentest Tools Apk
- Android Hack Tools Github
- Pentest Tools Android
- Hacker Search Tools
- Pentest Tools Kali Linux
- Hack Tools For Pc
- Pentest Tools Find Subdomains
- Hacker Tools For Ios
- Black Hat Hacker Tools
- What Is Hacking Tools
- Hacker Tools Mac
- Hackrf Tools
- Hack Tool Apk
- Pentest Tools Bluekeep
- Computer Hacker
- Pentest Tools Bluekeep
- Hacking Tools Hardware
- How To Make Hacking Tools
- Nsa Hack Tools Download
- World No 1 Hacker Software
- Hacker Tools Linux
- Hacking Tools And Software
- Easy Hack Tools
- Hacking Tools For Windows 7
- Hacking Tools Windows 10
- Hack Rom Tools
- Best Hacking Tools 2020
- Hack Tools For Games
- Underground Hacker Sites
- Hacking Tools Name
- Hacking Tools Free Download
- Hacking Tools Windows 10
- Hacker Tools 2019
- Hacking Tools Download
- Hack And Tools
- Hacking App
- Hacking Tools For Mac
- Hacker Tools Linux
- Pentest Tools Url Fuzzer
- Hacking Tools For Games
- Hacker Tools Free Download
- Hack App
- Pentest Tools Website
- Hacker
- Hacker Tools
- Hacker Tools Apk
- Nsa Hack Tools
- Hack Apps
- Hacker
- Hacker Hardware Tools
- Pentest Tools Nmap
- Hacking Tools Free Download
- Hacking Tools Github
- Hacking Tools And Software
- Pentest Automation Tools
- Hacker Techniques Tools And Incident Handling
- Kik Hack Tools
- Hacker Tools Online
- Pentest Tools Find Subdomains
- Hacking Tools 2019
- Tools 4 Hack
- Hacking Tools For Kali Linux
- Hack Tools For Games
- Tools Used For Hacking
- What Is Hacking Tools
- Pentest Tools For Windows
- Hacker Tools Windows
- Hacker Tools Windows
- Underground Hacker Sites
- Pentest Tools For Mac
- Hack Tools For Pc
- How To Hack
No comments:
Post a Comment
Have something to say about one of the videos or blogs, well here is a chance to do that now!!! Yes, you can do it, you know you can!!!!!