Update dll hijacking authored by Glass, Devon C. (S&T-Student)'s avatar Glass, Devon C. (S&T-Student)
......@@ -14,7 +14,7 @@ Cases in which it's possible to still DLL Hijack are:
##### This section will encompass a walk-through of finding vulnerable programs and DLL hijacking them to get escalated code execution.
The easiest way to find vulnerable program to search a CVE database.
In the example I use for this walk-trough I used https://cve.mitre.org/ and looked for commonly used programs susceptible to DLL Hijacking.
In the example I use for this walk-through I used https://cve.mitre.org/ and looked for commonly used programs susceptible to DLL Hijacking.
I settled on using Audacity, an open-source audio mixing software, as my attack vector.
![audacity](uploads/daaec88285c16efcb5d6add02b2bf39f/audacity.png)
......@@ -57,3 +57,5 @@ That's a lot of cmd windows!
#### Sources:
https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/
https://pentestlab.blog/2017/03/27/dll-hijacking/
https://liberty-shell.com/sec/2019/03/12/dll-hijacking/