king

Microsoft Teams Instant Messenger DLL Hijacking

Microsoft Teams Instant Messenger application on Windows 7 SP1 fully patched is vulnerable to remote DLL hijacking.










king

Intel's Commitment To Making Its Stuff Secure Is Called Into Question





king

uTorrent Users Urged To Upgrade To Mitigate Hijacking Flaw







king

Phrack - Attacking JavaScript Engines

Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622.




























king

TT-San-Hacking-Windows-CE.ppt

Hacking Windows CE - This paper shows a buffer overflow exploitation example in Windows CE. It covers knowledge about the ARM architecture, memory management and the features of processes and threads of Windows CE. It also shows how to write a shellcode in Windows CE including knowledge about decoding shellcode of Windows CE.




king

Windows Vista/7 lpksetup.exe DLL Hijacking

Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe.




king

NPS Datastore Server DLL Hijacking

A DLL side loading vulnerability was found in the NPS Datastore server DLL that ships with Windows Vista. This issue can be exploited by loading the affected DLL as an embedded OLE object. When instantiating the object Windows will try to load the DLL iasdatastore2.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.




king

BDA MPEG2 Transport Information Filter DLL Hijacking

A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.




king

.NET Framework 4.6 DLL Hijacking

A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View.







king

Another Day, Another Mass Domain Hijacking




king

Unprecedented DNS Hijacking Attacks Linked To Iran