Quote:
Originally Posted by Alaron01
[You must be logged in to view images. Log in or Register.]
PS: I see you've worked out more of this while I wrote this post. Cool. Gonna post it anyway in case you find something interesting.
|
No, this is good shit. Thanks for posting it!
Quote:
Originally Posted by Alaron01
[You must be logged in to view images. Log in or Register.]
They put the code for DLL injection into the DLL that's being injected though! So now this DLL main will make EQClient inject the very same DLL into your web browser.
|
So how exactly would the EQClient be able to inject this code into the web browser if it does not have access permission to touch the web browser?
I had a feeling that there was
some way to include malicious code in the dll file but I thought that it would also require specific conditions with the executable loading it, as well. Is it possible to know whether or not the EQClient can be used this way? Does the swapped dll file alter the executable file to inject code in this way, and how could it access other programs if the access permissions to do so were not originally granted to the executable loading the dll file?