| 1. |
Solve : Wiki leaks? |
|
Answer» So this page seems to be a hot topic today, unfortunitly I dont REALLY understand much of the technical side. Anyone want to dumb this down for me? https://wikileaks.org/ciav7p1/ Sounds super interesting though!It means that the big bad man is after your data.it is basically saying Uncle Sam has his eyes on youLittle less dumb por favor? Thanks guys..The CIA effectively had an archive of exploits in various software that they were using to gain access to systems. Dynamic-Link Library HijackingHere is a key point: Quote Programmers often don't specify an absolute path toYou can imagine this feature can be exploited. DLL Hijack is not just a matter of replacing one legal program with a bogus program with the same name. I is not so simple. Read the full text. Quote from: EricA. on March 09, 2017, 03:39:42 PM https://wikileaks.org/ciav7p1/cms/index.html You make software load "your" DLL, instead of the one intended. Then you can run code within the security context of that program. You do this by putting it on the Library Search path Geek mentioned, but "before" the actual DLL would be found in the order. For example, let's say we have GAME.EXE running, and it want's to load LIBRARY.DLL. So Windows now has to find it. First it looks in the directory where the executable is, then it looks in the Windows System directory (C:\Windows\System32) then it looks the Windows Directory, then it looks in the current directory, and then it looks at all the folders specified in the PATH environment variable. Source It's worth noting that this order directly contradicts what the order is stated to be in Geek-9pm's link. The Library Search order is different if a "SafeDLLSearchMode" is enabled. This has been enabled by default since Windows XP SP2 and causes the Current Directory to be searched after the Windows System directories. This makes everything in the posted page unusable; it relies on the current directory being searched before the standard system directories, which hasn't been the case for over a decade- it wasn't even relevant when it was written, not t hat it is my place to question such heavyweight researchers like 'Max "RIVAL"' DLL hijacking now requires a program to be specifically programmed to load from insecure locations (eg hard-coded or soft-coded paths) or to have insecure extensibility features that allow such things to happen. Skype isn't vulnerable, but it's Installer is; it doesn't rely on the Windows Search Order and specifically looks in the current directory for msi.dll, which means placing a malicious msi.dll in that folder will allow malicious code to execute. Otherwise, though, it requires administrator privileges to place the malicious DLL in a folder to have it be found first, which means it's seldom an infection vector but rather a payload action (eg something you do after you've taken control of a system). realistically it is somewhat overstated; it's just gathered information that for the most PART was already freely available on the INTERNET, mostly a set of tips and tricks it looks like for how to do their Job. If your paranoid it doesn't mean they aren't out to get you... Quote not t hat it is my place to question such heavyweight researchers like 'Max "RIVAL"'The objective is to help others understand the concept, not to provide a real recipe for malware. The information I gave wail not help a newbie write malware. As yu mentioned, it is out of date. The objective is actually to help people here with PC issues...with accurate and concise information... Not off-handed quotes from someone you found on some web site search... Quote from: patio on March 09, 2017, 07:28:30 PM The objective is actually to help people here with PC issues...with accurate and concise information...Please read the posted link. He does not tell yu how to make malware, but he does tell how to spot it by explaining how the exploit works. The issue for PC users is how to spot the possibility of a DLL hijack. The bogus DLL is in front of the search path. Quote from: Geek-9pm on March 09, 2017, 08:02:23 PM He does not tell yu how to make malware, but he does tell how to spot it by explaining how the exploit works.There is no difference between them. The only reason the "paper" doesn't describe how to make Malware is because it's wrong. |
|