OP 12 August, 2020 - 07:50 PM
Placing this here as this is an excellent read for pentesters. This is current information and not outdated.
[/code]
https://www.wietzebeukema.nl/blog/hijack...in-windows
Also a PoC tool to help with such task:
https://github.com/jfmaes/TrustJack
[/code]
Discord: Se7eN#7936
Code:
[code]
This post lists nearly 300 executables vulnerable to relative path DLL Hijacking on Windows 10 (1909), and shows how with a few lines of VBScript some of the DLL hijacks can be executed with elevated privileges, bypassing UAC.
https://www.wietzebeukema.nl/blog/hijack...in-windows
Also a PoC tool to help with such task:
https://github.com/jfmaes/TrustJack
[/code]
Current rep goal 18/25
Current Like goal 69/100
Discord: Se7eN#7936