SlideShare a Scribd company logo
DLL Preloading Attack
About Me
Security Consultant at Capmemini Pvt.Ltd.
Bug Bounty Haunter
Passionate about
Topics to Be Covered:
 History of DLL Loading Vulnerabilities
 Types of DLL Loading Vulnerability
 DLL Search Order
 What can affect search order
 Demo
 Recommendation
History of DLL Loading Vulnerabilities
 The pretty old theory of dll became popular when Microsoft released their security
advisory for ‘Insecure Library Loading’ in 2010.
https://technet.microsoft.com/library/security/2269637
Types of DLL Loading Vulnerability
 DLL Hijacking
 DLL Preloading
DLL Search Order
Using:
 Standard Search Order
 A Fully qualified path
 Manifest
 DLL Redirection
 SafeDllSearchMode
What can Affect Search Order
 Issue with search order:
System Searches directories in below order
The directory from which the application loaded.
System directory (C:WindowsSystem32).
The 16-bit system directory (C:WindowsSystem).
The Windows directory (C:Windows).
If attacker gets access to any of these orders , he can put a malicious dll with the name of legitimate in
that path.
Recommendation
 Use Fully qualified Path.
 Use DLL redirection or Manifest
 SafeDllSearch Mode
 Disable write permission to folders
Thank You
References:
https://msdn.microsoft.com/en-
us/library/windows/desktop/ff919712(v=vs.85).aspx
https://technet.microsoft.com/library/security/2269637
https://blog.netspi.com/testing-applications-for-dll-preloading-vulnerabilities/

More Related Content

DLL Preloading Attack