Service DLL Hijacking
1. The directory from which the application loaded.
2. The system directory.
3. The 16-bit system directory.
4. The Windows directory.
5. The current directory.
6. Directories in the PATH environment variable.Exploiting a Missing DLL
Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
Attack Path
Creating The DLL
Exploiting
References
Last updated