|
You are here |
pentestlab.blog | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | ||
| | | | |
redteaming.co.uk
|
|
| | | | | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL... | |
| | | | |
itm4n.github.io
|
|
| | | | | DLL Hijacking is the first Windows privilege escalation technique I worked on as a junior pentester, with the IKEEXT service on Windows 7 (or Windows Server 2008 R2). Here, I'd like to discuss one of its variants - DLL Proxying - and provide a step-by-step guide for easily crafting a custom DLL wrapper in the context of a privilege escalation. | |
| | | | |
blog.goodstuff.im
|
|
| | | [AI summary] A guide detailing the setup of Windows 10 and WSL2 for development, including installing Rust, configuring SSH, and integrating with VS Code. | ||