The number of services that can be exploited with DLL hijacking is virtually limitless. If a non-admin user can place a file in a SYSTEM-WIDE PATH, then that's the vulnerability. Not any of the services themselves.https://gist.github.com/wdormann/eb714d1d935bf454eb419a34be266f6f …
-
-
-
Wow! We could debate this all day!
But I think you missed the point here. This post wasn't about DLL hijacking. This was just an introduction to some basic Windows Internals.
I'll leave you with this simple question though: why did MS "fix" the IKEEXT service in Windows 8.1? - Još 3 druga odgovora
Novi razgovor -
-
-
Great job! The simple "dll hijacking", where you get as a "simple user" a "local service" shell, could be chained with our https://decoder.cloud/2019/12/06/we-thought-they-were-potatoes-but-they-were-beans/ … to get SYSTEM. Really sure it's by design?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.