<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=360%E6%A5%B5%E9%80%9F%E7%80%8F%E8%A6%BD%E5%99%A8_11.0.2086.0_dll%E5%8A%AB%E6%8C%81%E6%BC%8F%E6%B4%9E</id>
	<title>360極速瀏覽器 11.0.2086.0 dll劫持漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=360%E6%A5%B5%E9%80%9F%E7%80%8F%E8%A6%BD%E5%99%A8_11.0.2086.0_dll%E5%8A%AB%E6%8C%81%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=360%E6%A5%B5%E9%80%9F%E7%80%8F%E8%A6%BD%E5%99%A8_11.0.2086.0_dll%E5%8A%AB%E6%8C%81%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T07:30:49Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=360%E6%A5%B5%E9%80%9F%E7%80%8F%E8%A6%BD%E5%99%A8_11.0.2086.0_dll%E5%8A%AB%E6%8C%81%E6%BC%8F%E6%B4%9E&amp;diff=1652&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==漏洞原理== 瀏覽器啟動時,會自動加載當前目錄下載dll模塊，在加載系統dll，若發現存在dll模塊存在時,瀏覽器就會調用該dll模塊執行...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=360%E6%A5%B5%E9%80%9F%E7%80%8F%E8%A6%BD%E5%99%A8_11.0.2086.0_dll%E5%8A%AB%E6%8C%81%E6%BC%8F%E6%B4%9E&amp;diff=1652&amp;oldid=prev"/>
		<updated>2021-04-14T05:08:13Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==漏洞原理== 瀏覽器啟動時,會自動加載當前目錄下載dll模塊，在加載系統dll，若發現存在dll模塊存在時,瀏覽器就會調用該dll模塊執行...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==漏洞原理==&lt;br /&gt;
瀏覽器啟動時,會自動加載當前目錄下載dll模塊，在加載系統dll，若發現存在dll模塊存在時,瀏覽器就會調用該dll模塊執行。如果加載中未發現dll，攻擊者可以構造一個惡意dll。&lt;br /&gt;
&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
&lt;br /&gt;
===需要的工具===&lt;br /&gt;
Procmon漢化版 v3.20.0.0&lt;br /&gt;
&lt;br /&gt;
dll模塊（可自己編寫32位，兼容性。）&lt;br /&gt;
&lt;br /&gt;
DllHijackAuditor （自動化工具效果不是太好）&lt;br /&gt;
&lt;br /&gt;
procexp&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===360可以劫持的dll===&lt;br /&gt;
&lt;br /&gt;
api-ms-win-core-localization-l1-2-1.dll&lt;br /&gt;
api-ms-win-core-fibers-l1-1-1.dll&lt;br /&gt;
&lt;br /&gt;
放在根目錄下，也可以在其他目錄。&lt;br /&gt;
&lt;br /&gt;
Payload: https://github.com/JustYoomoon/Exploit/blob/main/payload.dll&lt;br /&gt;
&lt;br /&gt;
可以看出來加載了計算器。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==自動化工具==&lt;br /&gt;
http://www.onlinedown.net/soft/636085.htm&lt;br /&gt;
&lt;br /&gt;
https://cdn.securityxploded.com/download/DllHijackAuditor.zip&lt;br /&gt;
&lt;br /&gt;
https://github.com/MojtabaTajik/Robber/releases/tag/1.5&lt;br /&gt;
&lt;br /&gt;
https://github.com/rootm0s/WinPwnage&lt;br /&gt;
&lt;br /&gt;
https://github.com/mojtabatajik/robber&lt;br /&gt;
&lt;br /&gt;
https://github.com/sensepost/rattler&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>