DLL Injection & DLL Hijacking Explained | TryHackMe Abusing Windows Internals P2

Поделиться
HTML-код
  • Опубликовано: 23 ноя 2024

Комментарии • 6

  • @ece-b-087-thamaraiselvansp5
    @ece-b-087-thamaraiselvansp5 9 месяцев назад

    Nice video clear explanation 👏

  • @ece-b-087-thamaraiselvansp5
    @ece-b-087-thamaraiselvansp5 9 месяцев назад

    I am doing research on Windows agents built with C++. I have explored DLL hijacking, ensuring the DLL search order and folder permissions are correct. However, I observed that certain unwanted executable files are being read from a different folder with write permissions for standard users. Although it seems to only involve read operations and not opening queries, I placed my own executable file, and it doesn't execute. Are there any other possible attacks?

  • @anirudhsaxena9214
    @anirudhsaxena9214 7 месяцев назад +1

    A question how can we see which use has access to the process in cmd instead of task manager?

    • @MotasemHamdan
      @MotasemHamdan  7 месяцев назад +1

      use tasklist command

    • @anirudhsaxena9214
      @anirudhsaxena9214 6 месяцев назад

      @@MotasemHamdan but as far as i can see after using the tasklist command it doesn't shows user name which we can see when we go through the task manager-> detail

  • @PandaXpress668
    @PandaXpress668 10 месяцев назад

    Question - couldn't you just inject a system dll like hal32.dll?