mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2024-12-22 21:59:28 -05:00
Add DLL Hijacking from PentestLab
This commit is contained in:
parent
47092f788b
commit
668daca818
@ -134,6 +134,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info
|
|||||||
|
|
||||||
### DLL Hijacking
|
### DLL Hijacking
|
||||||
- [DLL Hijacking](https://ired.team/offensive-security/privilege-escalation/t1038-dll-hijacking): DLL Search Order Hijacking for privilege escalation, code execution, etc. by Red Teaming Experiments
|
- [DLL Hijacking](https://ired.team/offensive-security/privilege-escalation/t1038-dll-hijacking): DLL Search Order Hijacking for privilege escalation, code execution, etc. by Red Teaming Experiments
|
||||||
|
- [DLL Hijacking](https://pentestlab.blog/2017/03/27/dll-hijacking/): by PentestLab
|
||||||
- [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1038/): by MITRE
|
- [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1038/): by MITRE
|
||||||
- [PrivEsc: DLL Hijacking](https://gracefulsecurity.com/privesc-dll-hijacking/)
|
- [PrivEsc: DLL Hijacking](https://gracefulsecurity.com/privesc-dll-hijacking/)
|
||||||
- [Windows Privilege Escalation via DLL Hijacking](https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/): Crystal-clear view on one of the most used techniques for privilege escalation by the Threat Actors. by HacknPentest
|
- [Windows Privilege Escalation via DLL Hijacking](https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/): Crystal-clear view on one of the most used techniques for privilege escalation by the Threat Actors. by HacknPentest
|
||||||
|
Loading…
Reference in New Issue
Block a user