This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Read more
- New Hack Tools
- Pentest Tools Github
- Tools 4 Hack
- Pentest Tools Find Subdomains
- Hacking Tools For Beginners
- Pentest Tools Find Subdomains
- Hacking Tools Mac
- Pentest Automation Tools
- Best Hacking Tools 2020
- Ethical Hacker Tools
- Physical Pentest Tools
- Hacking Tools For Beginners
- Best Hacking Tools 2019
- Game Hacking
- Pentest Tools Windows
- What Are Hacking Tools
- Hacker Tools List
- Best Hacking Tools 2020
- Pentest Tools Android
- Tools For Hacker
- Hacker Tools Apk
- Hacker Tools 2020
- How To Hack
- Hack Tools For Ubuntu
- Hacks And Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Kali Linux
- Hacking Tools Download
- Hacker Tools Apk Download
- Computer Hacker
- Pentest Tools Linux
- Hacking App
- Hackrf Tools
- Pentest Tools Linux
- Pentest Tools Github
- Pentest Reporting Tools
- Pentest Tools List
- Hack Tools
- What Are Hacking Tools
- Hack Tools
- Pentest Recon Tools
- Hacker Tools List
- Hacking Tools For Kali Linux
- Hacker Tools Windows
- Install Pentest Tools Ubuntu
- Hacking Tools Name
- How To Hack
- Free Pentest Tools For Windows
- Hacker
- Pentest Tools Website
- Pentest Tools
- Hack Rom Tools
- Android Hack Tools Github
- Pentest Tools
- Hacker
- Nsa Hacker Tools
- Hak5 Tools
- Hacking Tools Hardware
- Pentest Tools Port Scanner
- Hacking Tools Pc
- Hacking Tools
- Hacking Tools For Pc
- Pentest Box Tools Download
- Pentest Reporting Tools
- Hacker Tool Kit
- Hack App
- Hacking Apps
- Hacker Tools Windows
- Hackers Toolbox
- Hacking Tools Download
Нема коментара:
Постави коментар