This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Pentest Tools Online
- Pentest Tools For Windows
- Hack Tools For Windows
- Hacking App
- Hackers Toolbox
- Hacker Tools Free
- Computer Hacker
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Pentest Tools Github
- Best Pentesting Tools 2018
- Hacking Tools And Software
- What Is Hacking Tools
- Ethical Hacker Tools
- How To Make Hacking Tools
- Hacking Tools Download
- Hack Tools 2019
- Hacking Tools For Windows 7
- Hacking Tools For Kali Linux
- Nsa Hack Tools
- Hacker Tools List
- Hack And Tools
- Hacker Tools Windows
- Best Hacking Tools 2019
- Hacking Tools For Beginners
- Hacking Tools Mac
- Hacker Tool Kit
- Hack Tools For Mac
- Hacker Tools For Windows
- Hack And Tools
- Pentest Box Tools Download
- Pentest Tools Review
- Free Pentest Tools For Windows
- Tools 4 Hack
- Pentest Tools Windows
- What Are Hacking Tools
- Pentest Tools Framework
- Pentest Tools Open Source
- Hack Tools
- Hacker Search Tools
- Pentest Tools Alternative
- Hacking Tools Free Download
- Best Pentesting Tools 2018
- Hack Tools For Games
- Black Hat Hacker Tools
- Hacking Tools For Beginners
- Free Pentest Tools For Windows
- Hacking Tools Usb
- Hacker Tools 2019
- Hacker Tools Linux
- What Is Hacking Tools
- Hack Tools For Pc
- Pentest Tools Bluekeep
- Pentest Tools List
- Black Hat Hacker Tools
- Hacking Tools Hardware
- Pentest Tools Subdomain
- Pentest Tools Review
- Easy Hack Tools
- Hacking Tools And Software
- Pentest Tools Find Subdomains
- Hacking Tools Github
- Hacker Hardware Tools
- Free Pentest Tools For Windows
- Pentest Tools Open Source
- Hacker Tools Windows
- Hacking Tools For Windows Free Download
- Hack Tools Pc
- Hacking Tools For Windows Free Download
- Hacking Tools For Windows 7
- Hack Tools
- Pentest Box Tools Download
- Hacking Tools For Windows Free Download
- Hacking Apps
- Hack Tools Download
- Termux Hacking Tools 2019
- Pentest Tools Review
- Underground Hacker Sites
- Install Pentest Tools Ubuntu
- Hacking Tools And Software
- Pentest Tools Linux
- Hacking Tools
- Hacker Tool Kit
- Beginner Hacker Tools
- Usb Pentest Tools
- Hacking Tools And Software
- Hacking Tools Download
- Pentest Tools For Windows
- Pentest Reporting Tools
- Hack Tools Github
- Usb Pentest Tools
- Android Hack Tools Github
- Wifi Hacker Tools For Windows
- Hacks And Tools
- Pentest Tools Free
- Nsa Hack Tools
- Growth Hacker Tools
- Computer Hacker
- Black Hat Hacker Tools
- Hack Website Online Tool
- Growth Hacker Tools
- Hak5 Tools
- Hacking Tools Download
- Kik Hack Tools
- Hacking Apps
- Pentest Tools Online
- Pentest Tools
- Hacking Tools Free Download
- New Hacker Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Free
- Hacker Search Tools
- Hack Rom Tools
- Hacking App
- Hacker Tools For Windows
- Hack Tool Apk No Root
- Hacker Tools Windows
- Pentest Tools For Ubuntu
- Hack Tools
- Pentest Tools Website
- Hacker Search Tools
- Hacking Tools Pc
- Hacker Tool Kit
- Hacking Tools Free Download
- Pentest Tools Url Fuzzer
- Pentest Tools Website
- Nsa Hack Tools
- How To Make Hacking Tools
- Hacking Tools Hardware
- Pentest Tools Framework
- Pentest Tools Tcp Port Scanner
- Hacking Tools Hardware
- Hack Tools For Windows
- Pentest Tools Url Fuzzer
- Growth Hacker Tools
- Hacker Tools Software
- Pentest Box Tools Download
- Github Hacking Tools
- Hacking Tools For Kali Linux
- Hacker
- Hack Tools For Ubuntu
- Hacker Tools Mac
- Hacking Tools Windows
- Hacking Tools Free Download
- How To Hack
- Pentest Reporting Tools
- Pentest Tools Website Vulnerability
- Hacking Tools And Software
- Pentest Box Tools Download
- Hack Tools For Mac
- Top Pentest Tools
- Pentest Tools Linux
- Pentest Tools Subdomain
- Hack Tools Pc
- Github Hacking Tools
- Hack Tool Apk No Root
- Hacking Tools Usb
- Hacking Tools For Windows
- Pentest Tools List
- Hacker Tools Windows
Aucun commentaire:
Enregistrer un commentaire