|
You are here |
cihansol.com | ||
| | | | |
www.codecentric.de
|
|
| | | | | Relative Path DLL Hijacking: Leverage legitimate Windows programs as a Red Teamer to run your own code. | |
| | | | |
itm4n.github.io
|
|
| | | | | DLL Hijacking is the first Windows privilege escalation technique I worked on as a junior pentester, with the IKEEXT service on Windows 7 (or Windows Server 2008 R2). Here, I'd like to discuss one of its variants - DLL Proxying - and provide a step-by-step guide for easily crafting a custom DLL wrapper in the context of a privilege escalation. | |
| | | | |
macrosec.tech
|
|
| | | | | The first thing we need to do is to identify which dll is crucial for discord to run because that is the dll we will use to perform dll hijacking. In order to find out, we need to open the file location of discord and we see: To identify the COM Keys of Chrome that we can use for COM Hijacking, we use the tool Process Monitor to identify all the processes running when Chrome runs, we also discover the COM servers that are missing CLSID's and the ones which don't require elevated privileges. We use the following filters: | |
| | | | |
zer1t0.gitlab.io
|
|
| | | |||