Files
metasploit-gs/external/source/DLLHijackAuditKit
Tod Beardsley 520d1e69c4 Rapid7 Comma Inc
After some more discussion with Rapid7's legal fellow.
2014-03-13 09:46:20 -05:00
..
2010-08-25 14:21:53 +00:00
2010-08-25 14:21:53 +00:00
2014-03-13 09:46:20 -05:00
2014-03-13 09:46:20 -05:00
2010-08-25 14:21:53 +00:00
2010-08-25 15:13:06 +00:00
2010-08-25 14:21:53 +00:00

Execute 01_StartAudit.bat as an administrative user. This will attempt to launch the

handler for all known file types. When this process is complete, access the open

ProcMon window and use the Save option from the File menu. Save the output to this

directory as a file named Logfile.CSV and make sure you choose the CSV file type.



Once Logfile.CSV has been created, execute 02_Analyze.bat as an administrative user.

This will attempt to validate each result and generate a list of proof-of-concepts

within the Exploit subdirectory. For the best results, manually review the ProcMon

logs to ensure that various corner cases and other related vulnerabilities are not

missed. 



Have fun!



-HD <hdm[at]metasploit.com>