Dynamic-link library or DLL, is Microsoft's implementation of the shared library concept in the Microsoft Windows and OS/2 operating systems.
DLL injection provides a manner for attributing the malicious .dll to running processes. Processes are tasks that are being handled by the operating system. DLL are Dynamic Link Libraries, are shared code that may be executed by a running process.There are two kinds of injection: static and dynamic injection. Static injection occurs prior to program execution. Dynamic injection occurs when processes are loaded into memory.
By injecting the DLL we can manipulate the working of the Process (.EXE File).
Prerequisites :
- Knowledge of Assembly Language.
- Knowledge of Windows API.
- OllyDBG - 32-bit assembler level analysing debugger for Microsoft® Windows®
Download the following files to view the demo of DLL Injection.
http://rapidshare.com/files/260514950/mshearts_MODIFIED.rar
*Not responsible for any type of malfunction
*Not intended for altering of Microsoft Products, just a tutorial
(Read more inside ..)
*Not responsible for any type of malfunction
*Not intended for altering of Microsoft Products, just a tutorial