Explore >> Select a destination


You are here

pentestlab.blog
| | cocomelonc.github.io
2.3 parsecs away

Travel
| |
| | redteaming.co.uk
1.8 parsecs away

Travel
| | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL...
| | itm4n.github.io
1.8 parsecs away

Travel
| | DLL Hijacking is the first Windows privilege escalation technique I worked on as a junior pentester, with the IKEEXT service on Windows 7 (or Windows Server 2008 R2). Here, I'd like to discuss one of its variants - DLL Proxying - and provide a step-by-step guide for easily crafting a custom DLL wrapper in the context of a privilege escalation.
| | blog.goodstuff.im
18.8 parsecs away

Travel
| [AI summary] A guide detailing the setup of Windows 10 and WSL2 for development, including installing Rust, configuring SSH, and integrating with VS Code.