View Single Post
  #42  
Old 10-19-2015, 11:19 PM
simp403 simp403 is offline
Kobold

simp403's Avatar

Join Date: Jul 2015
Posts: 100
Default

Quote:
Originally Posted by Alaron01 [You must be logged in to view images. Log in or Register.]
PS: I see you've worked out more of this while I wrote this post. Cool. Gonna post it anyway in case you find something interesting.
No, this is good shit. Thanks for posting it!

Quote:
Originally Posted by Alaron01 [You must be logged in to view images. Log in or Register.]
They put the code for DLL injection into the DLL that's being injected though! So now this DLL main will make EQClient inject the very same DLL into your web browser.
So how exactly would the EQClient be able to inject this code into the web browser if it does not have access permission to touch the web browser?

I had a feeling that there was some way to include malicious code in the dll file but I thought that it would also require specific conditions with the executable loading it, as well. Is it possible to know whether or not the EQClient can be used this way? Does the swapped dll file alter the executable file to inject code in this way, and how could it access other programs if the access permissions to do so were not originally granted to the executable loading the dll file?
__________________
Dinobots