Community
    • 登入

    DLL Hack in Notepad++

    已排程 已置頂 已鎖定 已移動 General Discussion
    44 貼文 13 Posters 59.4k 瀏覽
    正在載入更多貼文
    • 從舊到新
    • 從新到舊
    • 最多點贊
    回覆
    • 在新貼文中回覆
    登入後回覆
    此主題已被刪除。只有擁有主題管理權限的使用者可以查看。
    • Cory BlankenshipC
      Cory Blankenship
      最後由 編輯

      From what I’ve read in the Vault7 release, DLL injection is a great way to insert malicious code into the memory space where a legit DLL resides.

      I’m not terribly sure if this directly applies, but I found this post on StackOverflow on how to avoid DLL injection in Windows processes/applications:

      http://stackoverflow.com/questions/869320/how-do-i-prevent-dll-injection

      Honestly, I hadn’t heard of DLL injection prior to the Vault7 release, so the my comprehension of the matter is limited. I have to say that if I understand it correctly though, the concept is fascinating.

      1 條回覆 最後回覆 回覆 引用 0
      • Gilberto SCG
        Gilberto SC
        最後由 編輯

        Is it possible to know if my scilexer.dll has been hijacked?

        mkupperM Claudia FrankC 2 條回覆 最後回覆 回覆 引用 0
        • mkupperM
          mkupper @Gilberto SC
          最後由 編輯

          @Gilberto-SC said:

          Is it possible to know if my scilexer.dll has been hijacked?

          It depends on the hijack. The CIA, related organizations, and black-hat hackers, is adding spyware to computers and devices used by their targets. Among the things they do conceal that spyware is running is that are making changes to DLLs and/or intercepting calls to DLLs. Someone inspecting their process list will see nothing unusual. If they use Notepad++ they would see notepad++.exe running. If they close Notepad++ that process goes away.

          If the only change they made to the target’s computer is to replace DLLs with versions that include spyware then, yes, it’s possible to know if scilexer.dll has been hijacked. However, in order to replace scilexer.dll the attacker needed full administrative mode rights. If that’s the case they likely also installed a root kit and much more. If the target inspects scilexer.dll the bits and bytes they see will be exactly the same as the copy of scilexer.dll that comes with Notepad++ or similar products. The only way for a target to see if they have been hacked is to take the machine or device to a forensic lab and to have them tear it apart down to nearly the molecule level. Even with that they may miss the clues. See Stuxnet for an example of how attackers such as the CIA operate. The good news for the CIA is if the target hears about v7.3.3, installs it, that it’s going to pass the test. The target thinks they are safe (until they read this post) and the CIA continues to monitor the target. Once the CIA spots this post they may make arrangements so that the target sees something that leads them to believe they are safe. :-)

          1 條回覆 最後回覆 回覆 引用 0
          • Claudia FrankC
            Claudia Frank @Gilberto SC
            最後由 編輯

            @Gilberto-SC

            you can use procmon in order to find out which dll gets loaded, from where and when.
            Run procmon, define a filter for npp and then start npp.
            It needs a bit of training but if you are really interested in finding out what does what
            check out the sysinternals tools as well as everything Mark Russinovich has posted/blogged.

            Once you are at the level to understand how process, threads, libraries, drivers … work together
            download hxd and start investigating memory.

            Other useful tools can be found at nirsoft.

            Cheers
            Claudia

            1 條回覆 最後回覆 回覆 引用 0
            • 第一個貼文
              最後的貼文
            The Community of users of the Notepad++ text editor.
            Powered by NodeBB | Contributors