Explore >> Select a destination


You are here

cihansol.com
| | macrosec.tech
3.8 parsecs away

Travel
| | The first thing we need to do is to identify which dll is crucial for discord to run because that is the dll we will use to perform dll hijacking. In order to find out, we need to open the file location of discord and we see: To identify the COM Keys of Chrome that we can use for COM Hijacking, we use the tool Process Monitor to identify all the processes running when Chrome runs, we also discover the COM servers that are missing CLSID's and the ones which don't require elevated privileges. We use the following filters:
| | redteaming.co.uk
4.1 parsecs away

Travel
| | DLL Side-Loading or DLL Proxy loading allows an attacker to abuse a legitimate and typically signed executable for code-execution on a compromised system. Mitre has been keeping a log of this technique since 2017, and it continues to be a popular option by threat actors (For good reasons!) Proxy loading is very similar to DLL...
| | idafchev.github.io
4.1 parsecs away

Travel
| | A second look at the arcane art of shellcode writing
| | www.komodosec.com
31.9 parsecs away

Travel
| Learn about web penetration testing, potent web application vulnerabilities, their impact and solutions.