소스 검색

Update README.md

REDMED-X 2 년 전
부모
커밋
fec92e8d6c
1개의 변경된 파일1개의 추가작업 그리고 1개의 파일을 삭제
  1. 1 1
      KIT/DllEnvHijacking/README.md

+ 1 - 1
KIT/DllEnvHijacking/README.md

@@ -1,7 +1,7 @@
 # DllEnvHijacking
 This tool will: setup a hidden file structure, move an already on disk present malicious proxy DLL to the new system32 folder, hide the proxy DLL, modify the SYSTEMROOT environment variable, run the vulnerable binary as a spoofed process to execute the malicious DLL, and reset the original SYSTEMROOT environment variable so the beacon keeps working as intended. 
 
->Make sure that before you run this tool, the uploaded you malicious proxy DLL to an accessible folder on disk. 
+>Make sure that before you run this tool, you uploaded the malicious proxy DLL to an accessible folder on disk. 
 
 More information about the DLL Environment Hijacking attack can be found [here](https://www.wietzebeukema.nl/blog/save-the-environment-variables).