This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Computer Hacker
- Hacking Tools For Kali Linux
- Pentest Tools Open Source
- Hack Tools For Windows
- Nsa Hacker Tools
- Hacker Tools List
- New Hacker Tools
- Hack Tools Github
- Best Hacking Tools 2020
- Pentest Tools Port Scanner
- Tools For Hacker
- Hacker Tools Mac
- Hacking Tools Name
- Hacking Tools For Mac
- Hacker Tools Apk Download
- Hack Tools For Ubuntu
- Nsa Hack Tools
- Hacker Tools For Windows
- New Hacker Tools
- Hacker Tools List
- Hacking Tools Online
- Hacking Tools Kit
- Hack Tools For Mac
- Hacker
- Hack Tools Pc
- Hack Tool Apk No Root
- Hacker Tools Free
- Hacking Tools For Games
- Beginner Hacker Tools
- Best Hacking Tools 2020
- Hacking Tools For Games
- Game Hacking
- Hacker Tools 2019
- Hack Apps
- Hacker Tools Apk Download
- Hacking App
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Games
- Pentest Tools Download
- Hacking Tools For Windows
- Hacking Tools
- Beginner Hacker Tools
- Android Hack Tools Github
- Blackhat Hacker Tools
- Hacker Tools Free
- Easy Hack Tools
- Hacking Tools Mac
- Pentest Tools Port Scanner
- Hack Apps
- Pentest Tools Free
- Termux Hacking Tools 2019
- New Hacker Tools
- Install Pentest Tools Ubuntu
- Pentest Automation Tools
- Hacker Techniques Tools And Incident Handling
- Termux Hacking Tools 2019
- Hack Tools For Ubuntu
- Hacker Tools Github
- Hack App
- Hacking Tools Usb
- Install Pentest Tools Ubuntu
- Bluetooth Hacking Tools Kali
- Easy Hack Tools
- Pentest Recon Tools
- Easy Hack Tools
- World No 1 Hacker Software
- Hacker Hardware Tools
- Hacking Tools For Mac
- Hacking Tools Kit
- Hacking Tools For Windows 7
- Hacker
- Hacker Tools Linux
- Hacking Tools And Software
- Pentest Reporting Tools
- Hacking Tools
- Hack Tools 2019
- Hacker Tools List
- Pentest Reporting Tools
- Hacker Tools Free
- Pentest Tools For Ubuntu
- Pentest Tools For Windows
- Hack Tools Pc
- Hackers Toolbox
- Hacker Techniques Tools And Incident Handling
- Best Hacking Tools 2019
- Pentest Tools Free
- Hacker Tools For Ios
- Hacker Security Tools
- Pentest Reporting Tools
- Hacking Tools For Kali Linux
- Hacker Tools Free Download
- Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows 7
- Hacker Tool Kit
- Pentest Tools Online
- Pentest Tools Url Fuzzer
- How To Hack
- Best Hacking Tools 2020
- Hacker Techniques Tools And Incident Handling
- Hacking Tools
- Hacking Tools For Pc
- Pentest Recon Tools
- Pentest Tools List
- Hack Tools For Mac
- Hack Tools Pc
- Nsa Hack Tools
- Hacker Tools 2020
- Hacker Tools
- Pentest Tools Online
- Blackhat Hacker Tools
- Easy Hack Tools
- Pentest Reporting Tools
- Black Hat Hacker Tools
- Hacking Tools For Windows
- Pentest Recon Tools
- What Are Hacking Tools
- Hack Tools Github
- Hacking Tools Github
- Pentest Tools For Ubuntu
- Hack Tools For Pc
- Hacking Tools For Beginners
- Termux Hacking Tools 2019
- Tools 4 Hack
- How To Install Pentest Tools In Ubuntu
- Hack And Tools
- Hacker Tools Apk Download
- Hacker Techniques Tools And Incident Handling
- Ethical Hacker Tools
- Pentest Tools For Ubuntu
- Hacking Apps
- World No 1 Hacker Software
- Hack Tools Pc
- Pentest Tools Find Subdomains
- Pentest Tools Open Source
- Beginner Hacker Tools
- Hacker Tools 2020
- Hacker Hardware Tools
- Game Hacking
- Pentest Tools Download
- Hacker Tools Apk
- World No 1 Hacker Software
- How To Make Hacking Tools
- Hacking Tools Hardware
- Hacking App
- Hack Tools Pc
- Best Pentesting Tools 2018
- Hacker Tools Online
- Hacking Tools Download
- Hack Apps
- Hacker Tools For Windows
- Hack Tool Apk
- Hacking Tools And Software
- Hacker Tools Mac
- Hacker Security Tools
- Hacking Tools Kit
No hay comentarios.:
Publicar un comentario