itm4n / PrivescCheck

Privilege Escalation Enumeration Script for Windows
BSD 3-Clause "New" or "Revised" License
2.79k stars 416 forks source link

Hijackable DLLs | Include potential exploit path to dll #35

Closed alexdevassy closed 1 year ago

alexdevassy commented 2 years ago

It would be great if Pentester could also see the potential path to insert malicious dll in Hijackable DLLs Test, similar to how PowerUp's invoke-allchecks displays

itm4n commented 2 years ago

I'm not sure what you are talking about but it's already there. There is already the check Invoke-DllHijackingCheck that reports vulnerable %PATH% folders. The "Hijackable DLLs" check is just here to complement the test and show which DLLs can be hijacked this way on the current system, depending on the OS version.