T
That'sMyName
Guest
- First of all, that's just for my self, not for real attack. I just want to learn something.
- Let's say, I have my dll file embedded at somewhere inside other files (PNG, JPGE, DOC, ...).
- I known I can use memory mapped file and get binary of dll and then write it to new dll file, call LoadLibrary, GetProcAddress. It's acceptable but I think it's not what's going on in real world with hacker and attacker.
- So how they can call function embedded inside other files?
Continue reading...
- Let's say, I have my dll file embedded at somewhere inside other files (PNG, JPGE, DOC, ...).
- I known I can use memory mapped file and get binary of dll and then write it to new dll file, call LoadLibrary, GetProcAddress. It's acceptable but I think it's not what's going on in real world with hacker and attacker.
- So how they can call function embedded inside other files?
Continue reading...