CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/external/source/DLLHijackAuditKit/README.txt
Views: 11766
1
Execute 01_StartAudit.bat as an administrative user. This will attempt to launch the
2
handler for all known file types. When this process is complete, access the open
3
ProcMon window and use the Save option from the File menu. Save the output to this
4
directory as a file named Logfile.CSV and make sure you choose the CSV file type.
5
6
Once Logfile.CSV has been created, execute 02_Analyze.bat as an administrative user.
7
This will attempt to validate each result and generate a list of proof-of-concepts
8
within the Exploit subdirectory. For the best results, manually review the ProcMon
9
logs to ensure that various corner cases and other related vulnerabilities are not
10
missed.
11
12
Have fun!
13
14
-HD <hdm[at]metasploit.com>
15