Exploring hijacking techniques
Hijacking, a term that instantly conjures images of illicit takeovers and subversions, finds its place at the core of cyber warfare. More specifically, DLL hijacking, an art practiced by both malevolent hackers and those committed to ethical hacking, exposes vulnerabilities in software systems that can be manipulated to achieve unauthorized access and control. As we explore this potent technique, we’ll peer into the very mechanics of hijacking, uncovering its nuances and intricacies.
DLL hijacking
DLL hijacking, also known as a DLL preloading attack, involves placing malicious code in Windows applications by exploiting the method by which DLLs are loaded.
How does it work?
Important note
This book will only cover Win32 applications. Despite having the same extension, DLLs in the context of .NET
programs have an entirely different meaning, so we will not discuss them here. We don’t wish to contribute to the confusion.
It...