Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore DIY vulnerability discovery techniques focusing on DLL side loading in this 50-minute conference talk from BSides Augusta 2015. Delve into topics such as DLL hijacking, search paths, and testing for "Ghost DLL" injection. Learn about tools for auditing DLL injection, including Gflags and Dependency Walker. Discover practical defenses and gain insights into the importance of understanding these vulnerabilities. Engage with the speaker's blatant disclaimer and understand the rules of "Fight Club" as they apply to this security topic.
Syllabus
Intro
Blatant Disclaimer
Why bother?
Is anybody doing this?
DLL Hijacking
Where's Waldo?
Rules of Fight Club
DLL Search Path (Unsafe)
Default DLL Search Path (SafeSearch)
Testing for "Ghost DLL" injection
Registry Keys
Tools for Auditing DLL Injection
Gflags for the win!
Debug Output
HDMoore DIY for file extensions (2)
Dependency Walker (2)
Dependency Walker vs. Argon.exe
Practical Defenses (2)
Questions?