Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies.
Windows has a search path for DLLs in its underlying architecture. If you can figure out what DLLs an executable requests without an absolute path (triggering this search process), you can then place your hostile DLL somewhere higher up the search path so it’ll be found before the real version is, and Windows will happily feed your attack code to the application.
So, let’s pretend Windows’s DLL search path looks something like this:
and some executable “Foo.exe” requests “bar.dll”, which happens to live in the syswow64 (D) subdir. This gives you the opportunity to place your malicious version in A), B) or C) and it will be loaded into executable.
As stated before, even an absolute full path can’t protect against this, if you can replace the DLL with your own version.
Microsoft Windows protect system pathes like System32 using Windows File Protection mechanism but the best way to protect executable from DLL hijacking in entrprise solutions is :
And of course, this isn’t really limited to Windows either. Any OS which allows for dynamic linking of external libraries is theoretically vulnerable to this.
Also ReadADModule – Microsoft Signed ActiveDirectory PowerShell Module
Robber use simple mechanism to figure out DLLs that prone to hijacking :
MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify…
The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS)…
NimPlant C2 is a minimal Proof-of-Concept (PoC) beacon written in C, designed to operate as…
The Embedded USB Debugger (EUD) is a sophisticated tool developed by Qualcomm to enhance the…
Unleashed Recompiled is an unofficial PC port of Sonic Unleashed, created through the process of…
XenonRecomp is a powerful tool designed to convert Xbox 360 executables into C++ code, allowing…