Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Google, IBM & Meta Certificates — Less Than ₹22/Day
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore DIY vulnerability discovery techniques focusing on DLL side loading in this 50-minute conference talk from BSides Augusta 2015. Delve into topics such as DLL hijacking, search paths, and testing for "Ghost DLL" injection. Learn about tools for auditing DLL injection, including Gflags and Dependency Walker. Discover practical defenses and gain insights into the importance of understanding these vulnerabilities. Engage with the speaker's blatant disclaimer and understand the rules of "Fight Club" as they apply to this security topic.
Syllabus
Intro
Blatant Disclaimer
Why bother?
Is anybody doing this?
DLL Hijacking
Where's Waldo?
Rules of Fight Club
DLL Search Path (Unsafe)
Default DLL Search Path (SafeSearch)
Testing for "Ghost DLL" injection
Registry Keys
Tools for Auditing DLL Injection
Gflags for the win!
Debug Output
HDMoore DIY for file extensions (2)
Dependency Walker (2)
Dependency Walker vs. Argon.exe
Practical Defenses (2)
Questions?