|
You are here |
cocomelonc.github.io | ||
| | | | |
pentestlab.blog
|
|
| | | | | DLL Proxy Loading is a technique which an arbitrary DLL exports the same functions as the legitimate DLL and forwards the calls to the legitimate DLL in an attempt to not disrupt the execution flow so the binary is executed as normal. The technique falls under the category of DLL Hijacking and it is typically... | |
| | | | |
itm4n.github.io
|
|
| | | | | DLL Hijacking is the first Windows privilege escalation technique I worked on as a junior pentester, with the IKEEXT service on Windows 7 (or Windows Server 2008 R2). Here, I'd like to discuss one of its variants - DLL Proxying - and provide a step-by-step guide for easily crafting a custom DLL wrapper in the context of a privilege escalation. | |
| | | | |
scorpiosoftware.net
|
|
| | | | | The Application Verifier tool that is part of the Windows SDK provide a way to analyze processes for various types of misbehavior. The GUI provided looks like the following: Application Verifier application window To add an application, you can browse your file system and select an executable. The Application Verifier settings are based around the... | |
| | | | |
cocomelonc.github.io
|
|
| | | [AI summary] A technical tutorial explaining how to implement API hooking on Windows using C and DLLs to intercept and modify function calls. | ||