DLL Hijacking

This topic contains 0 replies, has 1 voice, and was last updated by  offs3tzer0 2 years, 12 months ago.

  • Author
    Posts
  • #8888
     offs3tzer0 
    Participant

    Hi,

    For testing purposes i generated a reverse shell as a DLL using MSFVenom and put it in application folder of my application that is vulnerable to DLL search order hijacking. My shell executes, but my application won’t start, obviously, as it can not load the needed libraries in the legit DLL file.

    Can someone please explain to me how i should go about getting my application to load the legit libraries, as well as my malware? Can I somehow put a pointer in my illegitimate DLL to the real DLL?

    Please reply in detail. Thank you!

You must be logged in to reply to this topic.

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?