DLL Preloading Attack

9

Click here to load reader

Transcript of DLL Preloading Attack

Page 1: DLL Preloading Attack

DLL Preloading Attack

Page 2: DLL Preloading Attack

About MeSecurity Consultant at Capmemini Pvt.Ltd.Bug Bounty HaunterPassionate about

Page 3: DLL Preloading Attack

Topics to Be Covered:History of DLL Loading VulnerabilitiesTypes of DLL Loading VulnerabilityDLL Search OrderWhat can affect search orderDemoRecommendation

Page 4: DLL Preloading Attack

History of DLL Loading Vulnerabilities

The pretty old theory of dll became popular when Microsoft released their security advisory for ‘Insecure Library Loading’ in 2010.

https://technet.microsoft.com/library/security/2269637

Page 5: DLL Preloading Attack

Types of DLL Loading Vulnerability

DLL HijackingDLL Preloading

Page 6: DLL Preloading Attack

DLL Search Order

Using: Standard Search Order A Fully qualified path Manifest DLL Redirection SafeDllSearchMode

Page 7: DLL Preloading Attack

What can Affect Search Order

Issue with search order:System Searches directories in below order The directory from which the application loaded. System directory (C:\Windows\System32). The 16-bit system directory (C:\Windows\System). The Windows directory (C:\Windows).

If attacker gets access to any of these orders , he can put a malicious dll with the name of legitimate in that path.

Page 8: DLL Preloading Attack

RecommendationUse Fully qualified Path.Use DLL redirection or ManifestSafeDllSearch ModeDisable write permission to folders