Spartacus
Spartacus DLL/COM Hijacking Toolkit
Install / Use
/learn @Accenture/SpartacusREADME
[!CAUTION] This repo is unmaintained, visit https://github.com/sadreck/Spartacus for the latest version.
Spartacus DLL/COM Hijacking Toolkit 
Why "Spartacus"?
If you have seen the film Spartacus from 1960, you will remember the scene where the Romans are asking for Spartacus to give himself up. The moment the real Spartacus stood up, a lot of others stood up as well and claimed to be him using the "I AM SPARTACUS" phrase.
When a process that is vulnerable to DLL Hijacking is asking for a DLL to be loaded, it's kind of asking "WHO IS VERSION.DLL?" and random directories start claiming "I AM VERSION.DLL" and "NO, I AM VERSION.DLL". And thus, Spartacus.
How is this tool different to all the other hijacking tools out there?
- Spartacus automates most of the process. It parses raw SysInternals Process Monitor logs, and you can leave ProcMon running for hours and discover 2nd and 3rd level DLL/COM hijacking vulnerabilities (ie an app that loads another DLL that loads yet another DLL when you use a specific feature of the parent app).
- Automatically generate Visual Studio solutions for vulnerable DLLs.
- Able to process large PML files and store all events of interest output into a CSV file. Local benchmark processed a 3GB file with 8 million events in 45 seconds.
- Supports scanning for both DLL and COM hijacking vulnerabilities.
- Supports generating self-signed certificates and signing DLL files.
- By utilising Ghidra functionality, extract export function signatures and execute your payload via individually proxied functions instead of running everything from
DllMain. This technique was inspired and implemented from the walkthrough described at https://www.redteam.cafe/red-team/dll-sideloading/dll-sideloading-not-by-dllmain, by Shantanu Khandelwal. [Defence]Monitoring mode trying to identify running applications proxying calls, as in "DLL Hijacking in progress". This is just to get any low hanging fruit and should not be relied upon.
Table of Contents
Installation
Find and download the latest version of Spartacus under Releases. Otherwise simply clone this repository and build from source.
Supported Functionality
Below is a description of each of the modes that Spartacus supports.
Note: Command line arguments have significantly changed from v1 to v2.
DLL Hijacking
The original functionality of Spartacus was solely finding DLL hijacking vulnerabilities. The way it works is:
- Generate a ProcMon (PMC) config file on the fly, based on the arguments passed. The filters that will be set are:
- Operation is
CreateFile. - Path ends with
.dll. - Process name is not
procmon.exeorprocmon64.exe. - Enable
Drop Filtered Eventsto ensure minimum PML output size. - Disable
Auto Scroll.
- Operation is
- Execute Process Monitor and halt until the user presses
ENTER. - User runs/terminates processes, or leave it running for as long as they require.
- Terminates Process Monitor upon the user pressing
ENTER. - Parses the output Event Log (PML) file.
- Creates a CSV file with all the NAME_NOT_FOUND and PATH_NOT_FOUND DLLs.
- Compares the DLLs from above and tries to identify the DLLs that were actually loaded.
- For every "found" DLL it generates a Visual Studio solution for proxying all of the identified DLL's export functions.
DLL Hijacking Usage
Collect all events and save them into C:\Data\logs.pml. All vulnerable DLLs will be saved as C:\Data\VulnerableDLLFiles.csv and all proxy DLLs solutions in C:\Data\Solutions.
--mode dll --procmon C:\SysInternals\Procmon.exe --pml C:\Data\logs.pml --csv C:\Data\VulnerableDLLFiles.csv --solution C:\Data\Solutions --verbose
Parse an existing PML event log output, save output to CSV, and generate proxy Visual Studio solutions.
--mode dll --existing --pml C:\MyData\SomeBackup.pml --csv C:\Data\VulnerableDLLFiles.csv --solution C:\Data\Solutions --verbose
Screenshots


COM Hijacking
A new functionality of Spartacus is to identify local COM hijacking vulnerabilities. The way it works is:
- Generate a ProcMon (PMC) config file on the fly, based on the arguments passed. The filters that will be set are:
- Operation is
RegOpenKey. - Process name is not
procmon.exeorprocmon64.exe. - Enable
Drop Filtered Eventsto ensure minimum PML output size. - Disable
Auto Scroll.
- Operation is
- Execute Process Monitor and halt until the user presses
ENTER. - User runs/terminates processes, or leave it running for as long as they require.
- Terminates Process Monitor upon the user pressing
ENTER. - Parses the output Event Log (PML) file.
- Identifies all missing registry keys that end in
InprocServer32and its result isNAME_NOT_FOUND. - If the identified key is under
HKEY_CURRENT_USER, search for its GUID underHKEY_CLASSES_ROOTand include its details in the export CSV (if found). - Create a CSV output with all the gathered information.
- Identifies all missing registry keys that end in
- Spartacus doesn't automatically create a Visual Studio solution for COM hijacking, however if you need to create a proxy DLL you can use the
proxymode.
For COM hijacking Spartacus also supports scanning the local system for misconfigured COM entries:
- Enumerate all of
HKEY_CLASSES_ROOT,HKEY_CURRENT_USER, andHKEY_LOCAL_MACHINE. - Look for registry keys that are called
InProcServer,InProcServer32,LocalServer, orLocalServer32. - Identify any missing EXE/DLL locations, along with any ACL misconfiguration such as the ability to Modify or Delete the file by the current user.
COM Hijacking Usage
Collect all events and save them into C:\Data\logs.pml. All vulnerable COM information will be saved as C:\Data\VulnerableCOM.csv.
--mode com --procmon C:\SysInternals\Procmon.exe --pml C:\Data\logs.pml --csv C:\Data\VulnerableCOM.csv --verbose
Process an existing PML file to identify vulnerable COM entries.
--mode com --existing --pml C:\Data\logs.pml --csv C:\Data\VulnerableCOM.csv --verbose
Enumerate the local system registry to identify missing/misconfigured COM libraries and executables.
--mode com --acl --csv C:\Data\VulnerableCOM.csv --verbose
Screenshots


DLL Proxy Generation
Spartacus supports generating Visual Studio solutions by creating skeleton projects for you to use, based on the DLL you wish to exploit.
- Redirecting all calls by exporting functions back to the legitimate DLL.
- This means that you will have to execute your payload from the
DllMainfunction.
- This means that you will have to execute your payload from the
- Using Ghidra, extract as many function signatures/definitions as possible from the target DLL, and create proxy functions for these.
- For any function that extracting its signature was not possible, it will be directly redirected to the legitimate function/dll.
- This means you can execute your payload from a function outside of
DllMain. - For instance, if you wish to exploit
version.dllyou could run your implant fromGetFileVersionInfoExWif that function is called by the vulnerable application.
DLL Proxy Generation Usage
Generate a solution that redirects all exports (no function proxying).
--mode proxy --dll C:\Windows\System32\version.dll --solution "C:\data\tmp\refactor-version" --overwrite --verbose --external-resources
It is possible to input multiple DLLs at once.
--mode proxy --dll C:\Windows\System32\version.dll --dll C:\Windows\System32\userenv.dll --solution "C:\data\tmp\dll-collection" --overwrite --verbose --external-resources
Create proxies for as many functions as possible (based on Ghidra's output).
--mode proxy --ghidra C:\ghidra\support\analyzeHeadless.bat --dll C:\Windows\System32\userenv.dll --solution C:\Projects\spartacus-userenv --overwrite --verbose
Same as above, but use external asset files to generate the solution (if you need to modify them).
--mode proxy --ghidra C:\ghidra\support\analyzeHeadless.bat --dll C:\Windows\System32\userenv.dll --solution C:\Projects\spartacus-userenv --overwrite --verbose --external-resources
Utilise pre-generated function prototypes for functions which Ghidra was unable to extract function definitions for.
--mode proxy --ghidra C:\ghidra\support\analyzeHeadless.bat --dll C:\Windows\System32\userenv.dll --solution C:\Projects\spartacus-userenv --overwrite --verbose --external-resources --prototypes C:\data\prototypes.csv
Generate proxies only for functions GetFileVersionInfoExW and GetFileVersionInfoExA.
--mode proxy --ghidra C:\ghidra\support\analyzeHeadless.bat --dll C:\Windows\System32\version.dll --solution C:\Projects\spa
