Description: DLL hijacking as an executable file is run, Windows loader maps the executable module to the process' s address space, executable module loader of the input table and try to find any required DLL, and they mapped to the process' s address space.
- [FireWallSys] - I spent huge sums of money to buy the so
- [keyvc] - Can be recorded in Chinese keylogger vc
- [HOOK_CreateFileW] - Intercepted using Detours library Create
- [AheadLib_2.2.150_Src] - err
- [LJsbcodes] - VC++ Figures, English characters, Chines
- [interept] - api interept
- [src] - DLL hijacking techniques, lpk.dll hijack
- [Dll-hijack] - Introduction What is a dll hijack techno
- [LPK] - Copy cat, the method of tinea LPK hijack
File list (Check if you may need any files):
lpk\lpk.cpp
...\lpk.dsp
...\lpk.dsw
...\ReadMe.txt
...\..lease\lpk.dll
...\.......\lpk.lib
...\Release
...\StdAfx.cpp
...\StdAfx.h
lpk