To exploit this vulnerability, which of the following criteria must be met?

While performing privilege escalation on a Windows 7 workstation, a penetration tester identifies a service that imports a DLL by name rather than an absolute path.

To exploit this vulnerability, which of the following criteria must be met?
A . Permissions not disabled in the DLL
B . Weak folder permissions of a directory in the DLL search path
C . Write permissions in the C:WindowsSystem32imports directory
D . DLL not cryptographically signed by the vendor

Answer: B

Explanation:

Reference: https://itm4n.github.io/windows-dll-hijacking-clarified/

Latest PT0-001 Dumps Valid Version with 248 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments