Design Pattern: Mitigating DLL Hijacking in Installers

Design Pattern: Mitigating DLL Hijacking in Installers


About 'DLL Search Order Hijacking' vulnerability?

Windows systems use a standard method to look for required DLLs to load into a program. Adversaries may take advantage of the Windows DLL search order and programs that ambiguously specify DLLs to gain privilege escalation and persistence.

Read More