Decoded: The Cybersecurity Podcast

DLL Hijacking: Windows Dynamic Link Library Exploits by Edward Henriquez


Listen Later

This podcast transcript, "DLL Hijacking: Exploiting the Windows Dynamic Link Library System," explains how attackers manipulate the way Windows applications load Dynamic Link Libraries (DLLs) to execute malicious code. It details various techniques like search order hijacking and side-loading, providing real-world examples such as Stuxnet and the CCleaner attack. The episode also covers how attackers identify vulnerabilities and implement their malicious DLLs, alongside methods for detecting and preventing such attacks, emphasizing the importance of understanding this persistent security threat.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez