DLL Hijacking is a nice tool we can count on when pentesting Windows systems. It is a very common mechanism mainly used for privilege escalation and to avoid Windows' User Account Control. It can be performed easier than you might think if software isn't appropriately secured and user privileges aren't well defined. In this post we will try to clarify how DLL Hijacking works and how potentially exposed you can be if vulnerable to this kind of attack. You will also find some tips on how to prevent this kind of attacks. What is Dynamic Library Linking? If you are reading this post, you might already be familiar with how code usually has dependencies on other third party code to provide certain functionalities. If not, you might be interested in reading this piece of information before continuing with this reading. There are basically two ways we can load libraries into our code: Static linking : Our program is linked with the external libraries at compile time. This means t...
In-depth insights and practical guidance on cybersecurity