This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related word
- Hacking Tools For Beginners
- Hack Tools For Pc
- Hacker Tools Linux
- What Are Hacking Tools
- Hack Tools For Ubuntu
- Black Hat Hacker Tools
- Hacker Tools For Mac
- Hacking Tools Windows 10
- Best Pentesting Tools 2018
- Hacker Tools List
- Pentest Tools Linux
- Hack Tools For Windows
- New Hacker Tools
- Growth Hacker Tools
- Hacker Tools Apk
- Pentest Automation Tools
- Pentest Tools List
- Hack Tools Github
- Hacking Tools For Mac
- Physical Pentest Tools
- World No 1 Hacker Software
- Hacking Tools Software
- Pentest Tools For Windows
- Hacking Tools Name
- What Is Hacking Tools
- What Are Hacking Tools
- Pentest Tools Linux
- Hacker Tools Online
- Pentest Tools Framework
- Hacker Tools List
- Pentest Tools Website Vulnerability
- Hacking Tools Name
- Hack Tool Apk
- Pentest Tools Subdomain
- Hacking Tools Online
- World No 1 Hacker Software
- Hacker Tools For Mac
- Pentest Tools List
- Hack Tools For Pc
- Hack Website Online Tool
- Hack Tool Apk
- Hacker Tools Mac
- Pentest Tools Windows
- Tools 4 Hack
- Pentest Tools Online
- Hacking Tools 2019
- Hack Tools Mac
- Hacking Tools Name
- Pentest Tools Alternative
- Hack Tools Download
- Github Hacking Tools
- Hack Tool Apk
- Hack Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Ios
- Install Pentest Tools Ubuntu
- Pentest Tools Linux
- Top Pentest Tools
- New Hack Tools
- Hacker Security Tools
- Hacker Tools List
- Hacker Tools
- Wifi Hacker Tools For Windows
- Game Hacking
- Computer Hacker
- Hacking Tools For Windows Free Download
- Hacker Tools Software
- Hacking Tools Free Download
- Nsa Hack Tools Download
- Pentest Tools Windows
- Hacking Tools For Windows
- Hacker Tools Free
- Tools Used For Hacking
- Tools 4 Hack
- Hacker Tools Online
- Blackhat Hacker Tools
- Easy Hack Tools
- World No 1 Hacker Software
- Hack Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacking Apps
- Hacker Security Tools
- Hacking Tools Name
- Hacking Tools Usb
- Best Hacking Tools 2019
- Hacking Tools For Kali Linux
- Pentest Recon Tools
- Hacking Tools For Pc
- Termux Hacking Tools 2019
- Hacking Tools Windows
- Hacker Tools Hardware
- Hacker Tools Software
- Pentest Tools Website Vulnerability
- Hacking Tools Download
- Pentest Tools Windows
- Hacking Tools Free Download
- Pentest Tools Alternative
- Hacker Tools For Mac
- Pentest Tools Online
- Hacking Tools Kit
- Pentest Tools List
- Nsa Hacker Tools
- Hacking Tools And Software
- World No 1 Hacker Software
- Pentest Tools Linux
- Top Pentest Tools
- Hack Tools For Ubuntu
- Hacker Tools Online
- Computer Hacker
- Pentest Tools Online
- How To Hack
- New Hack Tools
- Best Hacking Tools 2020
- Pentest Tools Apk
- Termux Hacking Tools 2019
- Hack And Tools
- Pentest Tools Url Fuzzer
- Best Hacking Tools 2019
- Termux Hacking Tools 2019
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Beginners
- Tools For Hacker
- Hacker Tools Online
- Pentest Tools Review
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Windows
- Pentest Automation Tools
- Tools Used For Hacking
- Hack Tools For Mac
- Hack Tools
- Hack Tools
- Hacking Tools Free Download
- Hack Apps
- Kik Hack Tools
- Top Pentest Tools
No hay comentarios:
Publicar un comentario