Advance Dll Hijacking For Blackhats And Cybersecurity Experts [ MODULE 2 ]

Advance Dll Hijacking For Blackhats And Cybersecurity Experts [ MODULE 2 ]

Thefreedom

JF-Expert Member
Joined
Jan 27, 2019
Posts
319
Reaction score
314
Niaje wanaaaaaaaaaaaaaa

Thefreedom hapa sasa leo embu tujaribu kuendelea pale ambapo tuliiiishia jana .

kama wewe ni mgeni basiii tupo hapa kudiscuss issue nzima ya dll HIJACKING fud backdoorS ambazo zinapelekea kuhack windows system silently.

unaweza jiuliza nini maaaana ya DLL HIJACKING ?

Unaweza rejea kwenye hii thread ya kwanza HAPA

ila kwa haraka haraka tunaweza sema

DLL hijacking hii ni moja ya technique ambazo hutumiwa na wadukuzi ku gain access kwenye secured system kwa kutumia windows software ambazo hutegemea(load) system Dynamic Link Libraries.

mfano nimedownload setup ya vlc.exe , hii vlc iliiweze kurun kwenye windows os ina dll (libraries) ambazo zinakuwa searched then zikimalizika kuwa processed basi utaona setup windows ya vlc kwenye pc yako. sasa dll hijacking inakuja mfano hii software wakati wa ku load hizo required dll inahitaji dll yenye jina mfano maharage.dll kwenye desktop au windows files , huyu mdukuzi anachofanya anatengeneza backdoor.dll ambayo atairename jina sawa na ile dll ambayo inahitajika na hio VLC ili kumaliza task.

so ukirun vlc.exe basi itanyanyua ile malicious dll na kuiexecute kwenye system ya user pasipo user kufahamu kitu chochote na mwisho mdukuzi huyu ataaingia kwenye system yako silently as administrator na kufanya chochote anachotaka as normal user (ambaye ni wewe mwenye pc)


sasa katika thread hii ya leo nitaenda waonesha demo project ambayo nimeifanya ili kuweza kupenya kwenye protected windows system yyte . hii inaitwa MOTHERBOARD DIGEST


DLL-Hijacking-2.jpg



MOTHERBOARD DIGEST


Hii ni framework ya kutengeneza malicious motherboard digest.dll ambayo imeandikwa kwa lugha ya computer ya c ( c programming) , python na bash script

ndani ya framework hii imebeba vitu vitatu

1. silent-motherboard digest.c < hii ndo main part >

2. compile.py < kiunganishi cha mwisho husaidia kuingiza shell codes zilizotengenezwa na generator na kuingiza ndani ya silent-motherboard digest.c na kutengeneza malicious.dll

3. generator < hii ni kwa ajili ya kutengeneza custom encoded shell codes (x86 & x64)




UFANYAJI WAKE WA KAZI SHORTLY

output ambayo imetengenezwa na hio framework hapo juuu imeandaliwa ku digest na ku hijack all built-in Microsoft programs (internet explr, calc.exe, notepad, n.k) kwa kusaidiwa na run32dll.exe na hii nimeangalia vitu vifuatavyo:

1. nimecheck libraries gani hazipo kwenye windows system na zinakuwa called pale tu built-in microsoft programs zikiwa zinatumiwa na victim.
Na haapa nimetumia processor monitor by MIcrosoft
unaweza pakua hapa Process Monitor - Windows Sysinternals

2. Baada ya kuzifahamu nikatumia ida pro au dll function exporter ili niweze kujua entry point zake kwa kila moja ili inipe urahisi kutumia custom dll generator ambayo nilitumia
kwenye thread ya kwanza (module 1) kutengeneza either meterpreter shell codes au custom encoded shell codes
Download IDA Pro Advanced Edition v6.1.rar

so endapo victim akiwa na hii backdoor basi inaenda kufanya vitu hatari viwili kwnye system WINDOWS NT

(a) ina add data kwenye applist na italocate automatic hio malicious.dll iko kwenye directory gani ya victim

(b) itaload string zote za applist ambayo kwasasa itaact kama dll forward loader na kuruhusu rundll32.exe kuwa hijacked soon
victim akirun built-in microsoft programs

PJEqV.png


hivyo basi

katika demostration hiii nimetumia makusudi meterpreter msf shell codes ambazo ziko detected sana na A.V nyingi famous

output ya 1 malicious dll ilikuwa na scan result hiii hapa AntiScan.Me | silent-motherbodyDIGEST.dll | 9/26

ouput 2 baaada ya kuremove some characters AntiScan.Me | silent-motherbodyDIGEST.dll | 3/26

na mwisho AntiScan.Me | silent-motherbodyDIGEST.dll | 3/26




BAADA YA HAPO KUPUNGUZA UREFU WA THREAD TAZAMA VIDEO DEMO HAPA MOTHERBOARD DIGEST DEMO


KAMA UTAKUWA NA NYONGEZA BASI UNAWEZA ONGEZA KWENYE COMMENTS SECTION
 
Nadhani pia ruhusa kwenye "C:\ProgramData\OpenVPN Connect" zinamruhusu attacker bila ruhusa ya admin Kuweza ku-place malicious DLL next kwenye tapinstall.exe.
 
Nadhani pia ruhusa kwenye "C:\ProgramData\OpenVPN Connect" zinamruhusu attacker bila ruhusa ya admin Kuweza ku-place malicious DLL next kwenye tapinstall.exe.

Yeah inawezekana maaana tabia ya haya ma libraries hayana urafiki na UAC alafu sasa hapo anaweza kuchagua ni ipi yenye high elevated permissions
 
Back
Top Bottom