Post AdPFUZVCKEjnLhd1tI by mttaggart@infosec.town
(DIR) More posts by mttaggart@infosec.town
(DIR) Post #AdPFUZVCKEjnLhd1tI by mttaggart@infosec.town
2024-01-01T15:36:02.731Z
0 likes, 0 repeats
Oooh, new LOL DLL Hijacking technique! www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout[1] Our research team has evolved the classic DLL Search Order Hijacking techniqu by deliberately targeting files located in the WinSxS folder.[2] Our approach lowers the probability of detection compared to the classic DLL Search Order Hijacking, as the malicious code operates within the memory space of a trusted binary located in the Windows folder WinSxS.[3] Unlike traditional methods, there is no requirement to introduce your own vulnerable binary, as Windows already includes various files stored in the WinSxS directory that can be leveraged.