If a web app is vulnerable to DLL Hijacking, attackers can load malicious DLLs in the PATH or other location that is searched by the application and have them executed by the application.ĭLL Hijacking attacks are broadly categorized into three types,ĭLL search order attack - If Windows OS search for the malicious DLL path in a specific order then it is DLL search order attack. For DLL hijacking attack to be successful, it would require an attacker to trick victims to open a file using a vulnerable application from a remote network location.ĭLL Hijacking is an attack vector that could allow attackers to exploit Windows applications search and load Dynamic Link Libraries (DLL). DLL Hijacking attacks are broadly categorized into three types - DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack.
0 Comments
Leave a Reply. |