This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Top Pentest Tools
- Growth Hacker Tools
- Hacker Tools Free
- Hacker Tools Apk Download
- Hack Tool Apk No Root
- Hacker Tools Apk
- Hacking Tools For Games
- Hacker Tools For Pc
- Hacker Tools Software
- Hack Tools Online
- Hacker Tools Online
- Usb Pentest Tools
- Hacker Tools Apk Download
- Hack Tools For Windows
- Pentest Tools Bluekeep
- Hacker Tools Apk Download
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Best Hacking Tools 2020
- World No 1 Hacker Software
- Hacker Tools Free Download
- Physical Pentest Tools
- Hacking Tools Pc
- Free Pentest Tools For Windows
- Hacker Tools Mac
- Hacking Tools For Beginners
- Top Pentest Tools
- Hacker Tools Online
- Hak5 Tools
- Pentest Tools Subdomain
- Hacker Tools Mac
- Hacking Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Android
- Growth Hacker Tools
- Hack Tools Github
- Hacking Tools And Software
- Hacking Tools Kit
- Hacking Tools For Windows 7
- Underground Hacker Sites
- Pentest Tools For Mac
- Pentest Tools Website
- Pentest Tools Url Fuzzer
- Hacker Tools Online
- Hack Tools For Pc
- Pentest Tools Kali Linux
- How To Make Hacking Tools
- Blackhat Hacker Tools
- Nsa Hack Tools
- Pentest Box Tools Download
- Hacking Tools For Beginners
- Hack Tools
- Pentest Reporting Tools
- Hackers Toolbox
- Pentest Reporting Tools
- Hack Tools Github
- Hacker Tools Mac
- Hacker Security Tools
- Hacking Tools Name
- Hacking Tools For Beginners
- Tools 4 Hack
- Hacker Tools Apk Download
- Hack Tools Github
- Hacker Tools Apk Download
- Hacker
- Hacking Tools Github
Nenhum comentário:
Postar um comentário