Slide 19
Slide 19 text
aaaddress1@chroot.org
'PE'
Opt Header
.text
.EntryPoint
.ImageBase
Section Data
.rdata .idata
a.exe
Process
PEB
PE
Module
ntdll.dll
VERSION.dll
user32.dll
...
LoadLibrary()
$PATH: {
"C:\hijack\VERSION.dll",
"C:\Windows\System32\VERSION.dll",
"C:\Windows\SysWoW64\VERSION.dll",
...
}
C:\hijack\a.exe
/?hijack