Shreyash TambeDLL File Analysis: A Practical Guide for Malware AnalystsDynamic Link Libraries (DLLs) are essential components in Windows operating systems, enabling code reuse and modular programming. However…Oct 26
InInfoSec Write-upsbyMiguel Méndez Z.DLL hijacking in TOTOLINK A600UB Driver Installer | CVE-2024–51141IntroductionOct 27Oct 27
Enes AdışenDLL Hijacking BasicsDLL Hijacking is a type cyberattack where a malicious actor takes advantage of a system’s search order for dynamic link libraries (DLL) to…Aug 14, 20231Aug 14, 20231
PawelKozyDetecting DLL Sideloading and Vulnerable Driver Loads Using HijackLibs and LOLDrivers APIsStreamlining KQL Queries with externaldata SourcesSep 24Sep 24
Shreyash TambeDLL File Analysis: A Practical Guide for Malware AnalystsDynamic Link Libraries (DLLs) are essential components in Windows operating systems, enabling code reuse and modular programming. However…Oct 26
InInfoSec Write-upsbyMiguel Méndez Z.DLL hijacking in TOTOLINK A600UB Driver Installer | CVE-2024–51141IntroductionOct 27
Enes AdışenDLL Hijacking BasicsDLL Hijacking is a type cyberattack where a malicious actor takes advantage of a system’s search order for dynamic link libraries (DLL) to…Aug 14, 20231
PawelKozyDetecting DLL Sideloading and Vulnerable Driver Loads Using HijackLibs and LOLDrivers APIsStreamlining KQL Queries with externaldata SourcesSep 24
LsecWeaponizing DLL Hijacking via DLL ProxyingSorry for not writing blogs for a while, but here am I now.May 4, 2023
Lazy HackerStreamlining DLL Hijacking with Automated TestingI’ve developed a script that automates the DLL hijacking process. During my testing, I noticed that we often focus on DLLs marked as “Not…Sep 3
PawelKozyDetecting DLL Hijacking Made Simple with HijackLibs and KQLLearn to detect DLL Hijacking with HijackLibs and KQL. Practical strategies and examples for enhancing detection capabilities.Mar 17