i watched all your videos man ! , you rock . keep up the good work
@Suviiii69Ай бұрын
Damn i was almost scared that this channel is getting discontinued 😭pls dont everrereeeee
@hexdump1337Ай бұрын
ahahah why? ofc not! just getting started
@Suviiii69Ай бұрын
@ 🥰was learning C and this channel seemed awwsome 🥰 tysm for the content being povided 🎀
@shuvobiswas4046Ай бұрын
Anazing explanation . But i have one question , which dll file is hijackable because when we enumarate service their are lots of service with their associated binarys. Forthermoe one binary can have multiple binary.
@hexdump1337Ай бұрын
Indeed, thats the question. The answer depends on your specific system. The general idea is that if you can overwrite those DLLs then you can do this attack. Or, another way, is if you can write in directories that are searched before the target DLL. Consider this a macro technique. The actual exploitation path will highly depend on the system you’re dealing with.