Added dll hijacking menu

This commit is contained in:
Victor Ramos Mello 2020-03-02 15:49:32 +01:00 committed by GitHub
parent 60eba4d4bf
commit 47092f788b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -13,6 +13,7 @@ A curated list of awesome privilege escalation
* [NFS](#nfs)
* [Presentations](#presentations)
* [Windows](#windows)
* [DLL Hijacking](#dll-hijacking)
* [Potato](#potato)
* [Unquoted services with spaces](#unquoted-services-with-spaces)
* [Groups.xml](#groupsxml)
@ -134,7 +135,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info
### DLL Hijacking
- [DLL Hijacking](https://ired.team/offensive-security/privilege-escalation/t1038-dll-hijacking): DLL Search Order Hijacking for privilege escalation, code execution, etc. by Red Teaming Experiments
- [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1038/): by MITRE
- [PrivEsc: DLL Hijacking](https://gracefulsecurity.com/privesc-dll-hijacking/):
- [PrivEsc: DLL Hijacking](https://gracefulsecurity.com/privesc-dll-hijacking/)
- [Windows Privilege Escalation via DLL Hijacking](https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/): Crystal-clear view on one of the most used techniques for privilege escalation by the Threat Actors. by HacknPentest
### Potato