user-ninjaDDL Hijacking

The process here is very similar to other methods of injection, we create a malicious DLL file that does what we want, compile it, and replace the DLL file that the application is looking for with our malicious one if we have access to manipulate that directory/file

Last updated