ソースを参照

Update README.md

REDMED-X 2 年 前
コミット
1a8d62c87d
1 ファイル変更1 行追加1 行削除
  1. 1 1
      KIT/DllEnvHijacking/README.md

+ 1 - 1
KIT/DllEnvHijacking/README.md

@@ -10,7 +10,7 @@ More information about the DLL Environment Hijacking attack can be found [here](
 * `<malicious DLL name>`: the name of the malicious DLL that will be loaded by the vulnerable binary (e.g. mswsock.dll).
 * `<path to mal. DLL folder>`: the path on the target system to the folder were the malicious DLL is stored (don't add the DLL name and end the path with a `\`)
 * `<name of vulnerable binary>`: the name of the vulnerable binary that will be executed and loads the malicious DLL (e.g. hostname.exe).
-* `<pid parent proc>`: the process ID of the parent process under which the vulnerable binary will run as a child.
+* `<pid parent proc>`: the process ID of the parent process under which the vulnerable binary will run as a child (parent process spoofing).
 
 ## Usage
 * `dllenvhijacking <new sysroot dir> <malicious DLL name> <path to mal. DLL folder> <name of vulnerable binary> <pid parent proc>`