Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/wietze/windows-dll-hijacking
Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
https://github.com/wietze/windows-dll-hijacking
Last synced: 7 days ago
JSON representation
Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.
- Host: GitHub
- URL: https://github.com/wietze/windows-dll-hijacking
- Owner: wietze
- License: gpl-3.0
- Created: 2020-06-18T22:03:43.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-05-13T21:25:16.000Z (7 months ago)
- Last Synced: 2024-11-09T10:39:02.115Z (about 1 month ago)
- Language: Python
- Size: 864 KB
- Stars: 439
- Watchers: 16
- Forks: 73
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-game-security - Project for identifying executables and DLLs vulnerable to relative path DLL hijacking
- awesome-hacking-lists - wietze/windows-dll-hijacking - Project for identifying executables and DLLs vulnerable to relative path DLL hijacking. (Python)
README
# Windows DLL Hijacking
## Background
This repo contains all scripts used to find _relative path DLL Hijacking_ candidates on Windows 10 (version 1909), as described in **[this blog post](https://wietze.github.io/blog/hijacking-dlls-in-windows)**.## Approach
The approach taken consists of two phases:
1. The first phase is about identifying which DLLs _may_ be vulnerable to hijacking;
2. The second phase is about confirming which ones actually do.Each phase is explained in more detail in the README files of their associated subfolders in this repo.
![Used approach, taken from the blog post.](approach.svg)
_Used approach,taken from the [blog post]((https://wietze.github.io/blog/hijacking-dlls-in-windows))_.
## Contents
| Item | Description |
| ---- | ----------- |
| [`1_finding_candidates/`](/1_finding_candidates/) | Files for Phase 1, which will result in a CSV file with all possible DLL hijack candidates. |
| [`2_compiling_dlls/`](/2_compiling_dlls/) | Files for Phase 2, which will result in a set of files identifying confirmed DLL hijack candidates. |
| [`dll_hijacking_candidates.csv`](/dll_hijacking_candidates.csv) | A CSV file with all identified _relative path DLL Hijacking_ candidates on Windows 10 (version 1909). |
| [`possible_windows_dll_hijacking.yml`](/possible_windows_dll_hijacking.yml) | Sigma rule identifying DLL loads of files in the list of DLL Hijack candidates from a folder other than their expected locations. |
| `REAMDE.md` | This file. |