This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
Related word
- Hacking Tools For Windows Free Download
- Hacker Tools For Mac
- Pentest Automation Tools
- Free Pentest Tools For Windows
- Hacking Tools Mac
- Install Pentest Tools Ubuntu
- Hacking Apps
- Pentest Box Tools Download
- Hacking Tools For Mac
- Tools 4 Hack
- Hacker Tools Free Download
- Pentest Tools Website
- Hacker Tools Free
- Hacking Tools Software
- Pentest Tools Free
- Hack App
- Termux Hacking Tools 2019
- Hacking Tools For Windows 7
- Tools 4 Hack
- Install Pentest Tools Ubuntu
- Growth Hacker Tools
- Hacker Hardware Tools
- Hack And Tools
- Game Hacking
- Beginner Hacker Tools
- Pentest Tools Nmap
- Hacking Tools For Pc
- What Is Hacking Tools
- Pentest Tools Tcp Port Scanner
- Pentest Tools Alternative
- Hacker Tools 2019
- Pentest Tools Website Vulnerability
- Hacking App
- Wifi Hacker Tools For Windows
- Hacking Tools For Beginners
- Hacking Tools Hardware
- Hackers Toolbox
- Pentest Tools Github
- Hack Tools For Games
- Game Hacking
- Pentest Tools Linux
- Pentest Tools For Windows
- Hacking Tools Name
- What Are Hacking Tools
- Black Hat Hacker Tools
- Hacking Tools Software
- Hacking Tools For Mac
- Hack And Tools
- Hack Tools For Pc
- Hacker Tools Mac
- Hacking Tools Windows 10
- Pentest Tools Open Source
- Hack Tools For Ubuntu
- Computer Hacker
- Pentest Tools Subdomain
- Install Pentest Tools Ubuntu
- New Hacker Tools
- What Is Hacking Tools
- New Hack Tools
- Hacking Tools Kit
- Pentest Tools Subdomain
- Hacker Search Tools
- Pentest Tools Url Fuzzer
- Pentest Tools For Windows
- Android Hack Tools Github
- New Hack Tools
- Hacking Tools Windows
- Hacker Tools For Mac
- Easy Hack Tools
- Hacker Tools For Mac
- Hacker Tools Mac
- New Hacker Tools
- Pentest Tools
- Easy Hack Tools
- Top Pentest Tools
- Hack Tool Apk
- Pentest Tools For Windows
- Hacking Tools For Games
- Hacker Tools Mac
- Usb Pentest Tools
- Free Pentest Tools For Windows
- Hacking Tools Software
- Hacking Tools Free Download
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Alternative
- Pentest Tools Website
- Hacking Apps
- Hack Tools For Games
- Hack Website Online Tool
- Hacking App
- Game Hacking
- Pentest Tools Alternative
- Pentest Tools Find Subdomains
- How To Hack
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Hacker Tools Github
- Hack Tools For Pc
- Pentest Tools Find Subdomains
- Hacker Tools Hardware
- Hack Tools For Games
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Hacker Tools 2020
- Hacking Tools Online
- Top Pentest Tools
- Pentest Tools Open Source
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Linux
- Hack Tools
- Pentest Automation Tools
- Pentest Automation Tools
- Hack Tools For Windows
- Hack Tools Mac
- Hacker Tools 2019
- Computer Hacker
- Hacking Tools
- Hacker Tools For Mac
- Hacking Tools Download
- Github Hacking Tools
- Ethical Hacker Tools
- Hack Tools Online
- Hack Tools Pc
- Pentest Recon Tools
- Pentest Tools Url Fuzzer
- Hack Tools 2019
- Hacks And Tools
- Hacker Tool Kit
- Pentest Tools Review
- Pentest Tools For Android
- Hack Tools For Games
- Android Hack Tools Github
- Hacker Tools
- Hacker Hardware Tools
- Hacking Tools Hardware
- Hacking App
- Game Hacking
- Pentest Tools Find Subdomains
- How To Hack
- World No 1 Hacker Software
- Hacker Security Tools
- Hacker Tools List
- Bluetooth Hacking Tools Kali
- Hack Tools 2019
- Pentest Box Tools Download
- Hacking Tools