#1
Placing this here as this is an excellent read for pentesters.  This is current information and not outdated.



Code:
[code]
This post lists nearly 300 executables vulnerable to relative path DLL Hijacking on Windows 10 (1909), and shows how with a few lines of VBScript some of the DLL hijacks can be executed with elevated privileges, bypassing UAC.
[/code]


https://www.wietzebeukema.nl/blog/hijack...in-windows


Also a PoC tool to help with such task:

https://github.com/jfmaes/TrustJack

[/code]
Current rep goal 18/25
Current Like goal 69/100

Discord: Se7eN#7936