Yesterday I was asked a couple of questions by someone that I mentor/help along the way with their own cyber security journey, to do with a few topics they are starting to look into. One such question asked was:
“What is a DLL and how can they be used for exploitation”
Now, I know the answer to this, but I found my repsonse to the individual in question, somewhat lacking, which made me feel a little disappointed in myself. So to that end, I thought I’d do a “do over”, so what did I do, I wrote a blog post about the answer of course, or rather my “Interpretation” of it.
Nothing new or ground breaking here, seasoned pentesters/red teamers/malware devs might want to skip it, but hopefully it’s better than the “wooly” explanation I provided yesterday… lol