DLL Hijacking - Hacking Attack Tutorial

preview_player
Показать описание
DLL Hijacking is an attack that exploits the way some Windows applications search and load DLLs that they need and use. Most Windows applications will not use a fully qualified path to load any required DLLs. A bad guy can place a DLL for a known program in a location that is searched before the real DLL's location almost guarantee that the malicious DLL is loaded, resulting in whatever code the attacker wants to run running! When programs are not written to specify the exact location of a required DLL, Windows will search for the DLL by name in a specific order.

MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.

Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.

Additional information can be found here:
Рекомендации по теме
Комментарии
Автор

Learn cybersecurity for free! Use the code "hacking" for a month of unlimited access to 600+ courses and 150+ hands-on labs:
-Click the "Get Started" button and create an account
-On the payment page, enter the coupon code "hacking" to get a free month

InfosecEdu
Автор

Thank you for making these videos so verbally simple, it really helps it to sink in.

malnute
Автор

Thanks for presenting us this valuable info. Please let me know some basic stuffs to learn for these msfconsole stuffs.. I want to understand it deep and exploit :)

madasameee
Автор

hi question about the webdav_dll_hijack it doesn't require a listener ? just a pure exploit will into the shell ?

AnnunakisReturn
Автор

You can once in you can type shell and it's will open a cmd thing so you can use cmd from the Hacker PC and change things on the remote pc

SuperWolfman
Автор

this looks like one of the tools from backtrack5 r3. im still a script kiddie but getting there.

vincentstolarczyk
Автор

i wonder why microsoft wont patch all this shit., maybe they use this them self for security cuz tyrany is security :P

phonyfelony
visit shbcf.ru