Exploit Pack - Documentation
  • Exploit Pack
    • Installation guide
    • License Activation
    • First steps
    • Running the network mapper
    • AutoPwn
    • UTF-8 Locator
    • Notepad
    • Reverse shell - One-liners
    • Hex Editor
    • GDB Connector
    • Log your actions
    • Exploits customization
    • Add a Proxy to Exploit Pack
    • Using Reverse Shells
    • XSS Agent - Tunnel
    • Advanced DLL Injections
    • VBS/PS Agent - Remote Access
    • VBS Agent Wizard
    • Exploit Development I
    • Exploit Development II
    • Exploit Development III
  • Control Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Control Pack
    • Launch your first agent
    • Control Pack agent's code
    • Agent connection
    • Java Agent
    • Browser Agent
    • VBS Agent
    • .NET Profiler DLL Agent
    • How to use the DLL + UnHooker Agent
    • .NET shell
    • Python Shell
  • Kernel Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Kernel Pack
    • Generating a new Rootkit
    • Deploying a Rootkit
    • Process hiding
    • Other features
Powered by GitBook
On this page

Was this helpful?

  1. Exploit Pack

Advanced DLL Injections

Execute DLL injections from Exploit Pack Framework.

PreviousXSS Agent - TunnelNextVBS/PS Agent - Remote Access

Last updated 2 years ago

Was this helpful?

DLL injection is a technique used to load malicious code for the purposes of defence evasion, persistence and privilege escalation. Rather than execute malicious code directly via an executable file, adversaries will force code to run in place of other code using the context of a legitimate process.

After getting a vector of attack, deploying an exploit, conducting the attack and having an agent running. How to get execution after connecting to the target machine? A very good option is to use a DLL attack.