Arctic

Tuesday, January 23, 2024

Koppeling - Adaptive DLL Hijacking / Dynamic Export Forwarding


This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.

This project is comprised of the following elements:

  • Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
  • Functions.dll: The "real" library which exposes valid functionality to the harness
  • Theif.dll: The "evil" library which is attempting to gain execution
  • NetClone.exe: A C# application which will clone exports from one DLL to another
  • PyClone.py: A python 3 script which mimics NetClone functionality

The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.

  • Stc-Forward: Forwards export names during the build process using linker comments
  • Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
  • Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
  • Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying

The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.


Example

Prepare a hijack scenario with an obviously incorrect DLL

> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.

> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.

Executing in the current configuration should result in an error

> whoami.exe 

"Entry Point Not Found"

Convert kernel32 to proxy functionality for wkscli

> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.

> whoami.exe
COMPUTER\User



Related posts
  1. Pentest Tools For Mac
  2. Hacking Tools Usb
  3. Beginner Hacker Tools
  4. Hacker Tools For Ios
  5. Best Hacking Tools 2019
  6. Hacking Tools Windows
  7. Hacker Tools For Pc
  8. Pentest Tools Windows
  9. Hacking Tools For Kali Linux
  10. Hacker Tools Software
  11. Pentest Tools For Ubuntu
  12. Hacker Tools 2020
  13. Blackhat Hacker Tools
  14. Pentest Tools Nmap
  15. Hacking Tools Windows 10
  16. Ethical Hacker Tools
  17. Pentest Recon Tools
  18. Hacking Tools For Mac
  19. Hacker Tools 2019
  20. Best Hacking Tools 2019
  21. Physical Pentest Tools
  22. Hacker Techniques Tools And Incident Handling
  23. Pentest Tools Download
  24. Github Hacking Tools
  25. Pentest Tools Linux
  26. Hacker Tools Apk
  27. Hack Tool Apk No Root
  28. Pentest Tools List
  29. Hacking Tools Mac
  30. Hacking Tools Mac
  31. Hacker Tool Kit
  32. Hacker Tools Linux
  33. Pentest Tools Port Scanner
  34. Pentest Tools Free
  35. Pentest Tools Framework
  36. Pentest Tools
  37. Pentest Tools Bluekeep
  38. Top Pentest Tools
  39. Growth Hacker Tools
  40. Physical Pentest Tools
  41. Hacker Tools For Ios
  42. Pentest Tools For Windows
  43. Pentest Box Tools Download
  44. Hacker Tools Free Download
  45. Pentest Tools Github
  46. Hack Rom Tools
  47. Hacker Search Tools
  48. Growth Hacker Tools
  49. Top Pentest Tools
  50. Pentest Tools Windows
  51. Pentest Tools For Android
  52. Hacker Tools Apk
  53. Hacker Tools Linux
  54. Hackrf Tools
  55. Hacking Tools Github
  56. Hack Tools For Windows
  57. Pentest Tools Website
  58. Hacking Apps
  59. Hack And Tools
  60. Hack Rom Tools
  61. Pentest Tools For Mac
  62. What Are Hacking Tools
  63. Hacker Tools List
  64. Hacker Tools Hardware
  65. Hacking Tools For Windows 7
  66. Pentest Tools Github
  67. Hacker Tools Apk Download
  68. Pentest Tools For Android
  69. Game Hacking
  70. Pentest Tools Review
  71. Pentest Tools Tcp Port Scanner
  72. Pentest Tools Bluekeep
  73. How To Hack
  74. Computer Hacker
  75. Hack Tools For Ubuntu
  76. Top Pentest Tools
  77. Hack And Tools
  78. Tools Used For Hacking
  79. Pentest Tools Linux
  80. Pentest Tools For Ubuntu
  81. Hacker Tools Github
  82. Hacker Tools Free
  83. Hack Tools 2019
  84. Hacker Tool Kit
  85. Pentest Tools List
  86. Pentest Tools For Android
  87. Hacker Tools For Windows
  88. Hacking Tools Software
  89. Pentest Tools For Android
  90. What Is Hacking Tools
  91. Hacking Tools For Mac
  92. Hack Apps
  93. Pentest Tools Android
  94. Pentest Tools For Android
  95. Nsa Hacker Tools
  96. Pentest Tools Tcp Port Scanner
  97. Pentest Tools Port Scanner
  98. Pentest Tools Website
  99. Pentest Recon Tools
  100. Pentest Tools Android
  101. How To Install Pentest Tools In Ubuntu
  102. Hack Tools Github
  103. Hacking App
  104. Kik Hack Tools
  105. Hacking Tools Hardware
  106. Hacker Tools For Ios
  107. Hacker Techniques Tools And Incident Handling
  108. Hacker Tools Mac
  109. Growth Hacker Tools
  110. New Hacker Tools
  111. Pentest Tools Free
  112. Usb Pentest Tools
  113. Hacking Tools 2019
  114. Hacking Tools For Windows
  115. Pentest Tools Online
  116. Bluetooth Hacking Tools Kali
  117. Hacking Tools For Beginners
  118. Hack Tools For Mac
  119. Nsa Hack Tools Download
  120. Android Hack Tools Github

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]



<< Home