This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related word
- Pentest Tools Website Vulnerability
- Hacking Tools Hardware
- Github Hacking Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows Free Download
- Pentest Tools Github
- Tools For Hacker
- Hacking Tools
- Hacking Tools For Windows Free Download
- Hack Tools
- Pentest Tools Review
- What Are Hacking Tools
- Pentest Tools Website Vulnerability
- Pentest Tools For Ubuntu
- Hack Website Online Tool
- World No 1 Hacker Software
- How To Hack
- Hacking Tools Hardware
- Growth Hacker Tools
- Hacking Tools Github
- Hack Tools For Ubuntu
- Hacking Tools Name
- Hack Tools
- Hacking Tools For Games
- Hack Tools 2019
- Pentest Tools Find Subdomains
- Hacker Tools Mac
- Pentest Tools Framework
- Free Pentest Tools For Windows
- Game Hacking
- Hacker Tools Mac
- Bluetooth Hacking Tools Kali
- Hacking Tools Usb
- Bluetooth Hacking Tools Kali
- Hack Tools Online
- Hak5 Tools
- Hackers Toolbox
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Beginners
- Hacking Tools Github
- Hacking Tools
- Hacking Tools Online
- Hacking Tools Download
- Easy Hack Tools
- Github Hacking Tools
- Pentest Reporting Tools
- Hacker Tools For Pc
- Hacking Tools For Games
- Hacker Tools Windows
- Hacking Tools Mac
- Hacker
- Pentest Tools List
- Hacker Tools 2020
- Hack Tools For Windows
- Pentest Automation Tools
- Hack Tools For Windows
- Game Hacking
- Pentest Tools Kali Linux
- New Hacker Tools
- Hacking Tools 2019
- Hacking Tools Github
- Hacker Tool Kit
- Pentest Tools Alternative
- Tools For Hacker
- Pentest Tools Windows
- Hack Website Online Tool
- Hacking Tools Pc
- Pentest Recon Tools
- Hacker Tools Windows
- Hacking Tools For Beginners
- Hacking Tools For Mac
- Hacking Tools For Windows
- Hacking Tools For Mac
- Hacker Search Tools
- Pentest Tools Framework
- Pentest Tools Review
- Hacker Tools
- What Are Hacking Tools
- Pentest Tools Kali Linux
- Wifi Hacker Tools For Windows
- Hacker Tools Free Download
- Hacking Tools Usb
- Beginner Hacker Tools
- Hacking Tools Free Download
- Nsa Hack Tools Download
- Hacker Tools Free Download
- Hack Tools
- Wifi Hacker Tools For Windows
- Hackers Toolbox
- Hacks And Tools
- Game Hacking
- Underground Hacker Sites
- Best Hacking Tools 2020
- Best Hacking Tools 2020
- Best Hacking Tools 2020
- Kik Hack Tools
- Hacker Tools Windows
- Pentest Tools Download
- Hack Website Online Tool
- Hacker Tools Linux
- Underground Hacker Sites
- Top Pentest Tools
- Nsa Hack Tools
- Hacking Apps
- Hack Tools 2019
- Hack Tool Apk
- Hacking App
- Hack App
- Pentest Reporting Tools
- Pentest Tools Kali Linux
- Hacker Tools Software
- Pentest Tools Windows
- Black Hat Hacker Tools
- Hacker Tools For Ios
- Pentest Recon Tools
- How To Hack
- Hack Tool Apk No Root
- Hack Tool Apk No Root
- Pentest Tools Subdomain
- Free Pentest Tools For Windows
- Hacker Tools Hardware
- Hacking Tools For Windows
- Termux Hacking Tools 2019
- Hacking Tools Free Download
- Hacker Tools Apk Download
- Pentest Tools
- Hack Rom Tools
- Hacking Tools Github
- Hacker Tools For Mac
- Hacker Hardware Tools
- Kik Hack Tools
- Hacking Tools Usb
- Hacker Tool Kit
- Hack Tools Github
- How To Make Hacking Tools
- Pentest Tools Nmap
- Hacker Tools Github
- Pentest Tools Android
- Hacker Tools Apk Download
- Hack App
- Easy Hack Tools
- Nsa Hacker Tools
- Hacking Tools Online
- How To Install Pentest Tools In Ubuntu
- Game Hacking
- Nsa Hack Tools Download
- Pentest Tools Android
- Hacking Tools Download
- Hacker Tools Free Download
- Tools Used For Hacking
- Black Hat Hacker Tools
- Hacking Tools 2019
- Pentest Tools Framework
- Hacking Tools Free Download
- Pentest Tools Nmap
- Hacker Tools
- Hacking Tools Software
No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.