This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
More info
- Hack Tools Online
- Hack Tools
- Hacker Tools Mac
- Hacking Tools Pc
- Hack Tools Mac
- Blackhat Hacker Tools
- Pentest Tools Subdomain
- Hacking Tools For Pc
- How To Make Hacking Tools
- Pentest Recon Tools
- How To Hack
- Pentest Tools Framework
- Hacker Tools Free Download
- Hacks And Tools
- Pentest Tools Bluekeep
- Pentest Tools Linux
- Hacking Tools Mac
- Pentest Tools Bluekeep
- Pentest Tools Website Vulnerability
- Hak5 Tools
- Pentest Tools Url Fuzzer
- Hacker Tools For Pc
- Hacker Tools Apk
- Best Pentesting Tools 2018
- Hacks And Tools
- Pentest Tools Alternative
- Beginner Hacker Tools
- Growth Hacker Tools
- Hacker Tools Hardware
- Hack Tools Download
- Hack App
- Pentest Tools Android
- Hacking Tools
- Hacking Tools 2019
- Hacking Tools Github
- Hacking Tools For Windows 7
- Beginner Hacker Tools
- What Are Hacking Tools
- Hacker Tools Apk
- Hack Tools For Ubuntu
- New Hack Tools
- Hacking Tools Download
- Hacking Tools For Pc
- Underground Hacker Sites
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Pentest Tools Review
- Hacker Tools For Ios
- Beginner Hacker Tools
- Beginner Hacker Tools
- How To Hack
- Best Hacking Tools 2019
- Hacking App
- Hacking Tools 2020
- Hack Tools
- Best Hacking Tools 2020
- Hacker Tools For Mac
- Hack Tools Pc
- Kik Hack Tools
- Pentest Tools Website
- Underground Hacker Sites
- Kik Hack Tools
- Pentest Box Tools Download
- New Hack Tools
- Hacking Tools For Windows Free Download
- Hack Apps
- Pentest Tools Website Vulnerability
- Android Hack Tools Github
- Hacking Tools Name
- Pentest Tools Download
- Underground Hacker Sites
- Hacker
- Kik Hack Tools
- How To Make Hacking Tools
- Hack Tools For Games
- Hacker Tools For Ios
- Nsa Hack Tools
- Pentest Tools Free
- Nsa Hacker Tools
- Nsa Hack Tools Download
- Pentest Tools Review
- Pentest Tools Url Fuzzer
- Hack Tools For Ubuntu
- Tools Used For Hacking
- Hacking Tools Free Download
- Hacker Security Tools
- Hacking Tools Github
- Pentest Tools Bluekeep
- World No 1 Hacker Software
- Hacking Tools Free Download
- Hacking Tools For Kali Linux
- Growth Hacker Tools
- Pentest Tools Free
- Free Pentest Tools For Windows
- Pentest Tools Windows
- Hacking Tools Github
- Pentest Tools Apk
- Ethical Hacker Tools
- Hacker Hardware Tools
- Hacking Tools For Pc
- Pentest Tools Review
- Hacking Apps
- Hacking Tools Kit
- Usb Pentest Tools
- Hacking Tools Windows
- Tools 4 Hack
- Pentest Tools For Ubuntu
- Nsa Hacker Tools
- Kik Hack Tools
- Hacker Tools
- Hacking Tools Free Download
- Pentest Tools Kali Linux
- Hacker Tools 2020
- Growth Hacker Tools
- Hacking Tools Software
- Pentest Tools Apk
- Hacker
- Pentest Tools Url Fuzzer
- Hacking Tools Name
- Pentest Tools Find Subdomains
- Kik Hack Tools
- Hacking Tools For Pc
- Hack Tools For Ubuntu
- Hacker Tool Kit
- Computer Hacker
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Hacker Tools Free Download
- Hacker Tools Free
- Hacking Tools Github
- Beginner Hacker Tools
- Hack Website Online Tool
- Hacking Tools Name
- Hacking Tools For Windows Free Download
- Usb Pentest Tools
- New Hacker Tools
- Pentest Recon Tools
- Pentest Tools Subdomain
- Pentest Tools List
- Hacking Tools Mac
- Hacking Apps
- Hack Tools 2019
- Hack Apps
- Pentest Tools Alternative
- Hack Tools Github
- Hacking Tools Usb
- Pentest Tools For Windows
- Pentest Tools
- Nsa Hack Tools Download
- Hacking Tools Software
- How To Hack
- Pentest Tools Alternative
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows 7
- Android Hack Tools Github
- Hacker Tools Free
- Hacking Tools
- New Hacker Tools
- Pentest Tools Url Fuzzer
- Hacker Tools
- Hacking Tools Windows 10
- Pentest Tools Framework
No hay comentarios:
Publicar un comentario