This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hack App
- What Is Hacking Tools
- Hack Tools
- Hack And Tools
- Best Pentesting Tools 2018
- Pentest Tools Tcp Port Scanner
- Top Pentest Tools
- Tools 4 Hack
- Hack Tools
- Hacker Tools Software
- Growth Hacker Tools
- Hack Tools For Ubuntu
- Pentest Tools Windows
- Hack Tool Apk No Root
- Hacker Hardware Tools
- Hacking Tools For Windows 7
- Hack Tools Pc
- Pentest Tools Download
- Hacker Tools Apk
- Best Hacking Tools 2020
- Hacker Tool Kit
- Hacker Tools Github
- New Hacker Tools
- Pentest Tools Port Scanner
- Pentest Tools Framework
- Easy Hack Tools
- Hacking Tools For Windows Free Download
- Hacking App
- Hacker Hardware Tools
- Black Hat Hacker Tools
- Blackhat Hacker Tools
- Pentest Reporting Tools
- Termux Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Wifi Hacker Tools For Windows
- Hacker Tools Apk
- What Are Hacking Tools
- Hack Tools
- Pentest Tools Alternative
- Hacker Tools List
- Bluetooth Hacking Tools Kali
- Hack Tools Download
- Hacker Tools For Mac
- Growth Hacker Tools
- Hack Tools For Pc
- Hacker Hardware Tools
- Install Pentest Tools Ubuntu
- Easy Hack Tools
- Pentest Tools Url Fuzzer
- Tools 4 Hack
- Game Hacking
- Best Pentesting Tools 2018
- Pentest Tools Linux
- Hacker Security Tools
- Pentest Automation Tools
- Best Hacking Tools 2019
- What Is Hacking Tools
- Pentest Tools Kali Linux
- Hack Tools
- Pentest Reporting Tools
- Top Pentest Tools
- Install Pentest Tools Ubuntu
- Hacking Tools For Kali Linux
- Physical Pentest Tools
- Pentest Reporting Tools
No comments:
Post a Comment