Changes
Page history
Update dll hijacking
authored
Mar 28, 2020
by
Glass, Devon C. (S&T-Student)
Show whitespace changes
Inline
Side-by-side
dll-hijacking.md
View page @
8b9bd002
...
...
@@ -14,7 +14,7 @@ Cases in which it's possible to still DLL Hijack are:
##### This section will encompass a walk-through of finding vulnerable programs and DLL hijacking them to get escalated code execution.
The easiest way to find vulnerable program to search a CVE database.
In the example I use for this walk-trough I used https://cve.mitre.org/ and looked for commonly used programs susceptible to DLL Hijacking.
In the example I use for this walk-t
h
rough I used https://cve.mitre.org/ and looked for commonly used programs susceptible to DLL Hijacking.
I settled on using Audacity, an open-source audio mixing software, as my attack vector.

...
...
@@ -57,3 +57,5 @@ That's a lot of cmd windows!
#### Sources:
https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/
https://pentestlab.blog/2017/03/27/dll-hijacking/
https://liberty-shell.com/sec/2019/03/12/dll-hijacking/