🗒️DLL Hijacking
Last updated
Last updated
DLLs are dynamic libraries that a program needs to run, this could be images, and commands.
How do we perform DLL hijacking?
As the name entails we will be hijacking a DLL by overwriting an already exsiting one. In order to see whether a DLL is hijackable I run PowerUp.ps1 and use the function Invoke-AllChecks in order to enumerate for Unquoted Service Paths and DLL hijackable dlls.
In this example we see that the vulnerable DLL file is called wlbsctrl.dll, so if we have write access to this file we can overwrite it with a malicious payload of our own in the dll form.