動画検索
関連広告
検索結果
Intro
Why DLL Hijack is my favorite persistence, talk about a few others
Going over the source code to our sample applications to talk about DLL Hijacking
Compiling our executable and dll then transfering it to our windows box
Using Process Monitor to show standard DLL Hijacking (when a DLL Does not exist)
Showing the order windows tries to load the DLL (Directory of binary then PATH)
Talking about a somewhat common mistake when people make edits to the PATH (ex: Java/Python/etc)
Placing the DLL test.exe is looking for and achieving code execution
Showing if we can write in c:\Windows, we can hijack most dll's explorer.exe loads from system32.
Messing up using Process Monitor for a bit, sorry should have prepped a bit more
Showing why explorer is unique, then putting CSCAPI.DLL into c:\Windows\... This would get ran anytime a user logs into the system
DLL Hijacking OneDrive for user level persistence
Wrapping up, talking about some videos where I talk more about creating DLL's which can help with this