This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Pentest Tools Linux
- Pentest Tools Windows
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Online
- Pentest Tools Nmap
- Hacker Tools Linux
- Underground Hacker Sites
- Hack Website Online Tool
- Top Pentest Tools
- Hack Tool Apk No Root
- Pentest Tools Linux
- Pentest Tools Free
- Pentest Tools Online
- Hacking Tools For Windows
- Hacking Tools For Windows 7
- Ethical Hacker Tools
- Hacking Tools For Mac
- Hacking Tools Download
- Hacking Apps
- Pentest Tools Port Scanner
- Hacker Tools 2019
- Black Hat Hacker Tools
- Nsa Hack Tools
- Beginner Hacker Tools
- Pentest Tools Nmap
- Hacking Tools For Kali Linux
- Hacking Tools Windows
- Free Pentest Tools For Windows
- Hacking Tools Online
- Nsa Hack Tools Download
- Pentest Tools For Android
- Hack Tools
- Hacking Tools Pc
- Pentest Tools For Mac
- Hack Tools For Games
- Pentest Tools For Ubuntu
- Hacking Tools For Pc
- Hacking Tools Windows
- Hacker Search Tools
- Usb Pentest Tools
- Tools For Hacker
- Hacker Tools 2020
- Hacking Tools Mac
- Hacker Tools List
- How To Hack
- Hack Tools For Games
- Pentest Tools List
- Hack And Tools
- Pentest Tools Apk
- Hack Tool Apk No Root
- Hack Tools Pc
- Best Pentesting Tools 2018
- Computer Hacker
- Pentest Tools Subdomain
- How To Hack
- Pentest Tools Subdomain
- Pentest Tools
- Hacker Tools 2019
- Growth Hacker Tools
- Hacker Tools Mac
- Hack Tools Github
- Hacker Tools
- Hacker Security Tools
- Hacking Tools For Kali Linux
- Best Hacking Tools 2019
- Pentest Tools Github
- Bluetooth Hacking Tools Kali
- Tools Used For Hacking
- Pentest Tools Linux
- Hacking Tools For Pc
- Hacking Tools Pc
- Nsa Hack Tools
- Easy Hack Tools
- Hacking Tools Download
- Hack Rom Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Review
- Pentest Tools Kali Linux
- Pentest Tools Linux
- Hacker Tools Apk
- Pentest Automation Tools
- Hacking Tools For Windows 7
- Hackrf Tools
- Pentest Tools Windows
- Hacker Search Tools
- Hack Website Online Tool
- Pentest Tools Bluekeep
- Hacker Tools For Windows
- Pentest Tools Nmap
- What Is Hacking Tools
- Pentest Tools Android
- Pentest Recon Tools
- Pentest Reporting Tools
- Hack Tools Github
- Hacking Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Free Download
- Best Hacking Tools 2020
- Hacking App
- Hacker Hardware Tools
- Hacking Tools For Windows 7
- Hacks And Tools
- Hacking Tools Windows
- What Are Hacking Tools
- Hacking Tools For Games
- Hacker Tools For Windows
- Hacking Tools Software
- Hack Tools For Pc
- Hacker Tools Online
- Pentest Tools
- Easy Hack Tools
- Hack App
- How To Install Pentest Tools In Ubuntu
- Android Hack Tools Github
- Pentest Tools
- Hack Tools Mac
- Top Pentest Tools
- Pentest Tools Open Source
- Hacker Tools Github
- Hacking Tools 2020
- Hack Tools Pc
- Hack Tools Github
- Hacking Tools 2020
- Hacker Tools Apk Download
- Hacking Tools Name
- Hack Tools For Pc
- Hacking Tools Hardware
- Pentest Tools Free
- Pentest Tools Github
- Pentest Automation Tools
- Hacking Tools Download
- Hack App
- Hack Tools Pc
- Hacking App
- Pentest Tools Android
- Pentest Tools List
- Pentest Tools Find Subdomains
- Wifi Hacker Tools For Windows
- Game Hacking
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Kali Linux
- Hacking Tools For Kali Linux
- Android Hack Tools Github
- Hacking Tools Hardware
- What Is Hacking Tools
- Pentest Tools Online
- Hacking Apps
- Pentest Tools Subdomain
- Wifi Hacker Tools For Windows
- Hacking Tools For Mac
- Hacker Tools Free
- Hackers Toolbox
- Hack Tools For Windows
- Pentest Tools For Ubuntu
- Pentest Tools List
- Hack Tools Online
- Hack Tools Download
- Ethical Hacker Tools
- Pentest Tools For Android
- Hacking App
- Hacking Tools
- Pentest Tools Windows
- Hacker
- Pentest Tools Linux
- Hacking Tools 2020
- Pentest Tools Review
- Pentest Tools List
- Growth Hacker Tools
- Hacking Tools Software
- Pentest Tools Url Fuzzer
- Hack Tools Mac
- Hacker Tools Hardware
- Pentest Tools Download
- Hack Tools For Games
- Best Hacking Tools 2020
Tidak ada komentar:
Posting Komentar