<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>All About DLL Hijacking - My Favorite Persistence Method</title>
        <link>https://stream.echo6.co/videos/watch/99e5305a-1c0f-404d-9a16-e605d8d90db2</link>
        <description>00:00 - Intro 00:25 - Why DLL Hijack is my favorite persistence, talk about a few others 02:03 - Going over the source code to our sample applications to talk about DLL Hijacking 03:20 - Compiling our executable and dll then transfering it to our windows box 04:50 - Using Process Monitor to show standard DLL Hijacking (when a DLL Does not exist) 06:10 - Showing the order windows tries to load the DLL (Directory of binary then PATH) 07:20 - Talking about a somewhat common mistake when people make edits to the PATH (ex: Java/Python/etc) 09:00 - Placing the DLL test.exe is looking for and achieving code execution 11:25 - Showing if we can write in c:\Windows, we can hijack most dll's explorer.exe loads from system32. 14:00 - Messing up using Process Monitor for a bit, sorry should have prepped a bit more 15:30 - Showing why explorer is unique, then putting CSCAPI.DLL into c:\Windows... This would get ran anytime a user logs into the system 17:55 - DLL Hijacking OneDrive for user level persistence 19:30 - Wrapping up, talking about some videos where I talk more about creating DLL's which can help with this</description>
        <lastBuildDate>Wed, 15 Apr 2026 11:05:10 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>All About DLL Hijacking - My Favorite Persistence Method</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/99e5305a-1c0f-404d-9a16-e605d8d90db2</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=99e5305a-1c0f-404d-9a16-e605d8d90db2" rel="self" type="application/rss+xml"/>
    </channel>
</rss>