DLL Hijacking for Privilege Escalation and Persistence

Is DLL Hijacking a vulnerability?
Read until the end to find out!

In this blog-post, I introduce DLL Hijacking, how this method can be exploited to achieve privilege escalation and persistence, and demonstrate the same through three lab simulations. I also list some defenses against DLL Hijacking at the end. To understand DLL Hijacking, it is important to understand what DLLs are and how the DLL Search Order works.

Read More