Post AdPFUZVCKEjnLhd1tI by mttaggart@infosec.town
 (DIR) More posts by mttaggart@infosec.town
 (DIR) Post #AdPFUZVCKEjnLhd1tI by mttaggart@infosec.town
       2024-01-01T15:36:02.731Z
       
       0 likes, 0 repeats
       
       Oooh, new LOL DLL Hijacking technique! www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout[1] Our research team has evolved the classic DLL Search Order Hijacking techniqu by deliberately targeting files located in the WinSxS folder.[2] Our approach lowers the probability of detection compared to the classic DLL Search Order Hijacking, as the malicious code operates within the memory space of a trusted binary located in the Windows folder WinSxS.[3] Unlike traditional methods, there is no requirement to introduce your own vulnerable binary, as Windows already includes various files stored in the WinSxS directory that can be leveraged.