Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS

As we know, Dynamic-link library(DLL) Side loading / DLL Hijacking is nothing new, nor is Windows Side-by-Side; however, side loading is handy from an adversarial tradecraft perspective, be it for establishing initial access, persistence, privilege escalation, or execution within an environment.
Dynamic-Link Library search order hijacking, often shortened to DLL hijacking, exploits an application's execution flow via external DLLs. By hijacking the search order used to load legitimate content, it is possible to force an application to load a malicious DLL. When a vulnerable application(I've found a few in the wild that are non-WinSxS binaries, including a CVE I got in 2020 for Nvidia) is set to run with elevated privileges, any malicious DLL loaded into it inherits those elevated privileges, thus enabling privilege escalation.
The application's behaviour often remains undisturbed since malicious DLLs are designed to seamlessly load the legitimate ones they replace or in cases where DLL paths aren't explicitly defined.
This discreet DLL launching capability presents myriad opportunities.
In scenarios where the use of Rundll32 is impractical, diverting the execution flow of a trusted binary, adhering to the principle of living off the land, offers a means to deploy malicious DLLs from diverse locations and inject them into legitimate processes.
What this also means is we can leverage legitimate binaries and multiple versions of said binaries for malicious purposes, taking DLL hijacking out of the equation for a moment; what it means is there are several copies of PowerShell and cmd.
Hunt out binaries in WinSxS. Map out DLLs being called from $currentdir.
Run HelloJackHunter and point it in a for loop at the DLLs. Hunting available binaries is relatively easy and just requires some PowerShell to start; the advice would be to do the research on your own dev system and replicate more in the target environment because none of the one-liners supplied are meant to be opsec safe and are more for highlighting quick paths to get the stuff you need/want.
To do this manually, Process Monitor can be leveraged to search through running processes for all DLLs loaded and called by running applications.
Once a list has been achieved of pwnable DLLs, the next step is to mass-build malicious DLLs; this is where HelloJackHunter comes into play.
If you are hunting for non WinSxS binaries, then you might want to add additional filters to exclude standard and trusted directories from which DLLs are loaded, such as C:Windows or any other directory that you consider safe.
The tool scans available DLLs and leverages dumpbin.
As a high-level proof of concept, the following code can be used to prove DLL hijacking; again, this is nothing new.
Occurs when the DLL is unloaded from the process's memory, which can happen either because the process is terminating or because the DLL is being unloaded dynamically by a call to FreeLibrary.
This case is typically used for cleanup tasks such as releasing shared resources, unregistering hooks, and deallocating memory used by the DLL to ensure a clean exit with no resource leaks.
The various functions are nothing new about DLL hijacking.
The new part where HelloJackHunter comes into play is mapping the available functions to trigger when the DLL is executed.
Each can be exploited with a DLL in the local directory and called to execute functions in search order hijacks.
It's important to note that YARA does not directly monitor system behaviour or real-time DLL loading activities.
To effectively monitor DLL loading paths in real-time, you would typically use other tools or system monitoring techniques in combination with something like Sysmon or similar.


This Cyber News was published on blog.zsec.uk. Publication date: Sun, 12 May 2024 09:13:05 +0000


Cyber News related to Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS

Side-by-Side with HelloJackHunter: Unveiling the Mysteries of WinSxS - As we know, Dynamic-link library(DLL) Side loading / DLL Hijacking is nothing new, nor is Windows Side-by-Side; however, side loading is handy from an adversarial tradecraft perspective, be it for establishing initial access, persistence, privilege ...
9 months ago Blog.zsec.uk Equation
New DLL Search Order Hijacking Technique Targets WinSxS Folder - A new DLL search order hijacking technique allows adversaries to load and execute malicious code in applications within Windows' WinSxS folder, incident response company Security Joes reports. Typically, DLL search order hijacking abuses applications ...
1 year ago Securityweek.com
New DLL Search Order Hijacking Variant Evades Windows 10 and 11 Protections - Security researchers have outlined a fresh variant of a dynamic link library search order hijacking technique, potentially enabling threat actors to circumvent security measures and execute malicious code on computers running Microsoft Windows 10 and ...
1 year ago Cysecurity.news
Attackers Can Bypass Windows Security Using New DLL Hijacking - Threat actors using the DLL Hijacking technique for persistence have been the order of the day and have been utilized in several attacks. This attack method allows bypassing the privilege requirement for executing certain malicious codes on the ...
1 year ago Cybersecuritynews.com
Imperva Client-Side Protection Mitigates the Polyfill Supply Chain Attack - The recent discovery of a website supply chain attack using the cdn. Polyfill.io domain has left many websites vulnerable to malicious code injection. Once a trusted resource for adding JavaScript polyfills to websites, the domain has recently become ...
8 months ago Imperva.com
Microsoft tests Windows 11 encrypted DNS server auto-discovery - Microsoft is testing support for the Discovery of Network-designated Resolvers internet standard, which enables automated client-side discovery of encrypted DNS servers on local area networks. Without DNR support, users must manually enter the info ...
1 year ago Bleepingcomputer.com
CVE-2022-4956 - A vulnerability classified as critical has been found in Caphyon Advanced Installer 19.7. This affects an unknown part of the component WinSxS DLL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The ...
1 year ago
Arid Viper Campaign Targets Arabic-Speaking Users - Cybersecurity experts at Cisco Talos have exposed the latest operations of the espionage-driven Arid Viper advanced persistent threat group. The new campaign, active since April 2022, has been targeting Arabic-speaking Android users. According to an ...
1 year ago Infosecurity-magazine.com
Why a Master's in Cyber Security is Your Ticket to a Thriving Career - It's like being a detective in the digital world, where you need to solve online mysteries and catch cybercriminals. To help you, we'll explore the reason why a Master's in Cyber Security is an excellent investment and ticket to a thriving career. ...
1 year ago Itsecurityguru.org
Deciphering Cybersecurity Vulnerabilities Requires Context - Imagine two security analysts engaging in conversation about the intricacies of their work when one receives hundreds of vulnerability alerts; all scored high risk at seven or eight. The exchange between our two analysts sheds light on the ...
1 year ago Securityboulevard.com
Unused Apps Could Still be Tracking and Collecting User's Data - While almost everyone in this era is glued to their smartphones for long hours, there still remain several mysteries about the device that are not actively being deduced by the users. Most of the users are still unaware that even when the apps are ...
1 year ago Cysecurity.news
Master the Art of Data Security - As we step further into the digital age, the importance of data security becomes increasingly apparent. As with all data storage services, it's crucial to ensure that the data stored on Amazon S3 is secure, particularly when it's 'at rest'-that is, ...
1 year ago Feeds.dzone.com
CVE-2019-14356 - ** DISPUTED ** On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display ...
2 years ago
CVE-2024-36016 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
Intel knew AVX chips were insecure and did nothing - Intel has been sued by a handful of PC buyers who claim the x86 goliath failed to act when informed five years ago about faulty chip instructions that allowed the recent Downfall vulnerability, and during that period sold billions of insecure chips. ...
1 year ago Theregister.com
CVE-2024-40947 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Are HTTP CSP Headers Sufficient to Secure Your Client Side? - One of the critical tools in the arsenal of web developers to fortify web application security is the HTTP Content-Security-Policy Headers. Designed to fortify the security of web applications, they allow developers to restrict which resources can ...
1 year ago Imperva.com
C/side Emerges From Stealth Mode With $1.7 Million Investment - C/side, a startup focusing on securing the browser supply chain, on Thursday emerged from stealth mode with $1.7 million raised in a pre-seed funding round led by Scribble Ventures, with additional investment from several angel investors. The ...
9 months ago Securityweek.com
Data broker's "staggering" sale of sensitive info exposed in unsealed FTC filing - One of the world's largest mobile data brokers, Kochava, has lost its battle to stop the Federal Trade Commission from revealing what the FTC has alleged is a disturbing, widespread pattern of unfair use and sale of sensitive data without consent ...
1 year ago Arstechnica.com
Mine Secures $30M in Series B Funding - PRESS RELEASE. BOSTON and TEL AVIV, Israel, Dec. 5, 2023 /PRNewswire/ - Mine, a pioneering company disrupting the data privacy market, announced today that it has raised $30 million in Series B funding, co-led by Battery Ventures and PayPal Ventures, ...
1 year ago Darkreading.com
Unveiling the OWASP Top 10:2021 Learning Path - Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. Preference cookies enable a website to remember information that changes the way the website behaves or looks, ...
1 year ago Offsec.com
Cisco Adds New Security and AI Capabilities in Next Step Toward Cisco Networking Cloud Vision - PRESS RELEASE. AMSTERDAM, Feb. 6, 2024 /PRNewswire/ - CISCO LIVE EMEA - Cisco, the leader in networking and security, today introduced new capabilities and technologies across its networking portfolio that are designed to drive a more unified and ...
1 year ago Darkreading.com
Rundown of Security News from AWS re:Invent 2023 - Amazon Web Services has been unveiling a steady stream of announcements during its AWS re:Invent 2023 event in Las Vegas this week. The focus over the four days, as expected, is on AI as AWS strives to show that its offerings can match - or surpass - ...
1 year ago Darkreading.com
API Security Flaw Impacted Grammarly, Vidio and Bukalapak - Salt Security has revealed research unveiling critical API security vulnerabilities in the OAuth protocol implementations of popular online platforms like Grammarly, Vidio and Bukalapak. These vulnerabilities, which have now been addressed, had the ...
1 year ago Infosecurity-magazine.com
Cisco Secure Access Extends SSE With Mobile Zero Trust - Earlier this year, we introduced Cisco Secure Access, a security service edge solution that combines a secure web gateway, cloud access security broker, firewall-as-a-service, zero trust access and more, to help organizations address this challenge ...
1 year ago Feedpress.me

Cyber Trends (last 7 days)