all InfoSec news
Dynamic Linking Injection and LOLBAS Fun
Blog - Praetorian www.praetorian.com
Dynamic-Linking Injection and LOLBAS Fun Introduction LoadLibrary and LoadLibraryEx are how Windows applications load shared libraries at runtime. Praetorian recently tested a .NET web application that unsafely passed user input into LoadLibrary. In this article, we discuss this vulnerability class, dubbed dynamic-linking injection. We begin with an explanation of the vulnerability. We then walk through […]
The post Dynamic Linking Injection and LOLBAS Fun appeared first on Praetorian.
application applications article class discuss dynamic fun injection input introduction lolbas praetorian product security runtime vulnerability vulnerability research web web application windows