Understanding DLL Hijacking for Payload Execution

preview_player
Показать описание
Be better than yesterday -

This video showcases how DLL Hijacking can be used to execute malicious commands by first identifying missing DLL files loaded by a legitimate program on a Windows system. This can be done with the help of an official Microsoft binary - Process Monitor (ProcMon).

The video provides a step-by-step walkthrough guide and a practical demonstration on how you can identify missing DLL files loaded by a program using ProcMon and subsequently, compile and generated an example C++ DLL payload file that is used as a proof of concept. It was possible to execute our DLL payload file through Burp Suite Community.

DLL Hijacking is a very useful technique to understand as it can potentially allow bypassing of restricted environments - whereby only whitelisted programs can be executed. It will be possible to bypass such restrictions if the whitelisted programs can be analysed to determine if DLL files that are intended to be loaded and executed are missing from the Windows system.

In addition, DLL Hijacking is often abused by malicious threat actors to maintain persistence on a compromised Windows machine as it avoids the common TTPs on modifying common auto startup registry settings and creation of schedule tasks.

Stay connected:

DLL Hijacking Useful References:

Gemini Security Awesome Hacking T-Shirts - Support the channel:
Рекомендации по теме
Комментарии
Автор

Superb, just a suggestion - turn down the music in the background a bit, it is distracting. Great video!

UpSurge-jx
Автор

Hey man I have seen almost all your videos, I follow your steps but none of them work out for me. Now I'm trying to make an exe to control a computer without the defender detecting it. Might you help me? pls

tlykuyiyhaa
Автор

In the last video i coment that i need your help "Hello, I tried to open ScareCrow but I can't but when I open it. it tells me to install a version of Go 1.19 or later and I do it but it still won't let me"

yassineourahouaarouss
Автор

I can't understand, when I'm testing DLLs using rundll32.exe feature, nothing happens just error with not found entry point. Have you installed something for running dll libs?

halfbelf
Автор

Bro ur video is awesome. Your accent sounds like Singaporean

jialechua
join shbcf.ru