To exploit this vulnerability, which of the following criteria must be met?
While performing privilege escalation on a Windows 7 workstation, a penetration tester identifies a service that imports a DLL by name rather than an absolute path.
To exploit this vulnerability, which of the following criteria must be met?
A . Permissions not disabled in the DLL
B . Weak folder permissions of a directory in the DLL search path
C . Write permissions in the C:WindowsSystem32imports directory
D . DLL not cryptographically signed by the vendor
Answer: B
Explanation:
Reference: https://itm4n.github.io/windows-dll-hijacking-clarified/
Latest PT0-001 Dumps Valid Version with 248 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments