All About DLL Hijacking - My Favorite Persistence Method

Поделиться
HTML-код
  • Опубликовано: 22 янв 2025

Комментарии • 74

  • @ismailarame3756
    @ismailarame3756 2 года назад +34

    ippsec i am so amazed that your channel is so organized and consistent as well as putting timestamps in each video you release i do not know how thank you, you made it easy for us to learn i appreciate it too much 🖤🖤

  • @pbjandahighfive
    @pbjandahighfive 2 года назад +4

    lul
    14:55 "Let's see... is there a process name?"
    >Proceeds to pass directly over "Process Name" no less than 3 times.
    Great video all the same. Subscribed.

  • @elevatecyber5031
    @elevatecyber5031 2 года назад +20

    This is such good information. It's surprising that DLL hijacking isn't talked about more in this community. This is core education for any aspiring red teamer.

    • @trustedsecurity6039
      @trustedsecurity6039 2 года назад +2

      It is talked a lot but you dont see it because you just look at channel where only basic stuff is teach

  • @cemkaaidarov2415
    @cemkaaidarov2415 Год назад

    Thank you for sharing another great video. I'm grateful for the knowledge you've shared. I've lived in this area for 10 years and I'm excited to share this with my team, especially with the "kids". Your video will help them understand the topic much faster than my long and sometimes boring lectures.

  • @allenxd
    @allenxd 2 года назад

    OMG Nice timing ippsec! was doing a thick client test and actually trying some dll hijacking stuff. lol this is really helpful.

  • @atthaphonrattanarueanphet1362
    @atthaphonrattanarueanphet1362 2 года назад

    So MANY of the episodes are bangers

  • @shiverello6109
    @shiverello6109 2 года назад +6

    Me at 8 in the morning after many hours of HTB "Im in a weird state" xD Love your videos, very organized and just full of information 👌

  • @jmprcunha
    @jmprcunha 2 года назад

    It is always a pleasure watching Your videos. Thank You Ippsec!

  • @HishanShouketh
    @HishanShouketh 2 года назад

    The right daily dose of cyber security, thank you so much for this awesome demo.so well explained.

  • @vectar
    @vectar 2 года назад

    Thanks for the amazing content IppSec! Love your channel, keep em coming!

  • @ex6tenCe
    @ex6tenCe 2 года назад

    wow this video showed a couple of cool ideas, which were unknown to me. got my sub

  • @R4z0r_arg
    @R4z0r_arg 11 месяцев назад

    Amazing video IppSec, thanks

  • @thepianoaddict
    @thepianoaddict 2 года назад +8

    Maybe these shortcuts don't work if you're in a vm, but on windows 10 if you hit win+x it will open a menu, if you then hit i, it will open powershell, if you do win+x and then a, it will open powershell as admin.
    These shortcuts work for the english version of windows, other languages sometimes have other keys once you're inside the menu.
    Very informative video!

  • @Cod3rMax
    @Cod3rMax 2 года назад

    But is is possible to write the code that you did in c++ with c#? Because when i do it and i try i'm getting error trying to access peotected memory

  • @digitaldavid5633
    @digitaldavid5633 2 года назад

    Very Helpful! Please do more like this. Thanks!

  • @securiti
    @securiti 2 года назад

    Helpful videos! Love your content.
    Would love to catch a live stream some day on Twitch.

  • @khalilthebest7005
    @khalilthebest7005 2 года назад +1

    😁wow that’s cool 👍the best part

  • @Badcitizenlgn
    @Badcitizenlgn Год назад

    Amazing content, thanks for sharing

  • @AnkitSharma-cs6ez
    @AnkitSharma-cs6ez Год назад

    Hey ippsec, I am not able to cd or dir ..\.dotnet\ I tried different ways but it is not working. I am using Windows 11. is it the one causing issues or what is it ?

  • @jumpstep7085
    @jumpstep7085 2 года назад

    More persistence and slipping under the radar! :D

  • @patrickw0x1
    @patrickw0x1 2 года назад

    Oh didn't realize you are on Twitch now. I'll be sure to check out your streams.

  • @mounir7320
    @mounir7320 2 года назад +5

    thanks for the video...it would be great if you share some evasion techniques of (modern AV/EDR..) using DLL hijacking.

    • @ippsec
      @ippsec  2 года назад +29

      That sounds like a very dangerous thing to share. I wouldn't do a video on something so weaponizable.

    • @damuffinman6895
      @damuffinman6895 2 года назад +2

      Just use base64 encoding works all the time

    • @dadamnmayne
      @dadamnmayne 2 года назад +4

      Offensive Security has entered the chat.

    • @maclie7078
      @maclie7078 2 года назад

      @@ippsec if I'm not wrong your doing part of cybersecurity and penetration testing and of course they are part of it any thanks you help us every day😊

    • @AUBCodeII
      @AUBCodeII 2 года назад

      pepsic is an anagram of ippsec.

  • @romanxyz7248
    @romanxyz7248 2 года назад

    Amazing video.Thank you ❤️

  • @jarsal_firahel
    @jarsal_firahel Год назад

    Pretty awesome !

  • @callmekelvin
    @callmekelvin 2 года назад

    Another great video...

  • @Novastuffnow
    @Novastuffnow 2 года назад

    Great video!

  • @UmairAli
    @UmairAli 2 года назад

    this is so awesome

  • @zedeleyici.1337
    @zedeleyici.1337 2 года назад

    you are great, i love it

  • @kavishkagihan9495
    @kavishkagihan9495 2 года назад

    Being new at DLL hijacking, I am having trouble understanding how DLL proxying works. Would love a dedicated video about that topic. Cheers!

    • @ippsec
      @ippsec  2 года назад +3

      It’s not high on my priority list because it’s not valuable for defenders to understand that concept. I try to keep it at a basics level for red team stuff.

    • @kavishkagihan9495
      @kavishkagihan9495 2 года назад

      If anyone is curious like myself about DLL proxying, check this out ruclips.net/video/tSdyfaJ7T50/видео.html

  • @vincenttheriault3256
    @vincenttheriault3256 2 года назад

    Amazing info

  • @MrSerek
    @MrSerek 2 года назад

    can you do priv esc with this? Find some app running as system with a missing dll and slap a fake dll into writeable path to run some commands would be my guess

    • @ippsec
      @ippsec  2 года назад

      Yes, that is certainly possible.

    • @hexagon6290
      @hexagon6290 2 года назад

      Some apps you can replace a DLL they load with your own and gain privs that way

    • @MrSerek
      @MrSerek 2 года назад

      @@hexagon6290 yeah thats the goal, I need to find some weak (writeable and loading dlls that arent in KnownDlls) file running as NT Authority.

    • @trustedsecurity6039
      @trustedsecurity6039 2 года назад

      @@hexagon6290 you dont need to replace an existing DLL for that... i didnt looked the video so idk if ippsec talks about it but im sure he did, you just see what DLL isnt found by known software installed in the victim workstation on a writable directory

  • @stanislavsmetanin1307
    @stanislavsmetanin1307 Год назад

    Wow)) It is fantastic

  • @zedeleyici.1337
    @zedeleyici.1337 2 года назад

    thnaks for content !

  • @xternl_
    @xternl_ 2 года назад

    Wonderful.

  • @peterw6583
    @peterw6583 2 года назад

    If cscapi.dll is replaced by your customized one, won't it affect the normal behavior of explorer.exe?

    • @ippsec
      @ippsec  2 года назад +1

      Normally if you don’t use a dll proxy technique yes. However, I think explorer just imports cscapi but doesn’t use it

  • @epicvideos41
    @epicvideos41 2 года назад

    sir you did not show how to fix it

  • @TracerPortable
    @TracerPortable 2 года назад

    I fell like you are quite swifty with winapi, any tips? Maybe some video with basics? I don't know why but when I see MS documentation I just want to puke, I barely understand anything

  • @IBITZEE
    @IBITZEE 2 года назад

    such good info...
    and doing it live helps a lot to avoid those 'natural' mistakes...
    ps: you site design seems just useful... no sh***... just all the juice...

  • @itswellick9507
    @itswellick9507 2 года назад

    hey ippsec. Is it possible to watch the twitch live stream history?

    • @ippsec
      @ippsec  2 года назад

      Nope, think i said it at the start of the video but at this time, I don't plan on releasing VOD's for my streams.

    • @itswellick9507
      @itswellick9507 2 года назад

      @@ippsec I'm sorry I missed it. By the way, thanks for everything you taught me.

    • @ippsec
      @ippsec  2 года назад +3

      No worries, I plan on uploading raw clips or redoing them like this one for the YT. I’m just more comfortable in interacting with people live if there’s no record of it. I may setup the patreon again and post recordings there, just don’t want to do it before it’s a routine

  • @ca7986
    @ca7986 2 года назад

    ❤️

  • @kezkya3683
    @kezkya3683 2 года назад

    Waw, u r such a gem

  • @JOJO-no8rb
    @JOJO-no8rb 2 года назад

    Can you do more content about win api with c

  • @wyteedeng1874
    @wyteedeng1874 2 года назад

    I got a cat ?

  • @cipher4873
    @cipher4873 2 года назад

    heeyyy

  • @AUBCodeII
    @AUBCodeII 2 года назад

    ipp
    dll

  • @itsme7570
    @itsme7570 2 года назад

    Man oh man. More of this type of content please. Anyone know of a way to bypass cdn or cloud providers to find origin IP? My trusty python script that always works is failing on some of these cloud hosted sites or cloud firewall

  • @spear7916
    @spear7916 2 года назад +1

    First

  • @yahyahassan3430
    @yahyahassan3430 2 года назад

    The website needs a domain renewal. Anyway thanks for the content.

  • @JOJO-no8rb
    @JOJO-no8rb 2 года назад

    Ippsec thank you very much