DLLHijackHunter v1.2.0 - Now with automated UAC Bypass & COM AutoElevation discovery
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的英文内容,我先仔细阅读一下。 文章主要介绍了一个名为DLLHijackHunter的工具的更新版本v1.2.0。这个工具用于检测DLL劫持漏洞,特点是零误报。新版本增加了UAC绕过模块,包括.COM自动提升扫描、Manifest自动提升扫描以及模拟复制和侧载攻击路径等功能。用户可以通过指定配置文件来专门搜索这些漏洞,并且可以从GitHub获取最新版本。 接下来,我需要将这些信息浓缩到100字以内,同时保持内容的准确性和完整性。要注意不要使用“文章内容总结”或“这篇文章”这样的开头,直接描述文章内容。 可能的结构是:首先介绍工具名称和新版本号,然后说明新增的功能模块及其具体功能,最后提到获取方式。 例如:“DLLHijackHunter v1.2.0发布,新增UAC绕过模块,支持.COM自动提升扫描、Manifest自动提升扫描及模拟攻击路径,并提供专用配置文件供用户使用。工具已开源并可从GitHub下载。” 这样既涵盖了主要信息,又控制在了字数范围内。 </think> DLLHijackHunter v1.2.0发布,新增UAC绕过模块,支持.COM自动提升扫描、Manifest自动提升扫描及模拟攻击路径,并提供专用配置文件供用户使用。工具已开源并可从GitHub下载。 2026-3-5 14:45:34 Author: www.reddit.com(查看原文) 阅读量:14 收藏

Hey everyone,

We just pushed v1.2.0 of DLLHijackHunter, our automated (and zero-false-positive) DLL hijacking discovery tool.

For those unfamiliar, DLLHijackHunter doesn't just statically analyze missing DLLs; it uses a canary and a named pipe to actually prove the execution and report the exact privilege level gained (SYSTEM, High Integrity, etc.).

What's new in v1.2.0: We've built out a completely new UAC Bypass Module. Finding standard service hijacks is great, but we wanted to automate the discovery of silent UAC bypasses

.COM AutoElevation Scanning: The tool now rips through HKLM\SOFTWARE\Classes\CLSID hunting for COM objects with Elevation\Enabled=1. It checks both InprocServer32 (DLLs) and LocalServer32 (EXEs) to find bypass vectors akin to Fodhelper or CMSTPLUA.

Manifest AutoElevate: Scans System32 and SysWOW64 for binaries with the <autoElevate>true</autoElevate> XML node.

Copy & Drop Side-Load Simulation: If it finds an AutoElevate binary that doesn't call SetDllDirectory or SetDefaultDllDirectories to protect its search order, it simulates a realistic attack path where the execution is moved to a writable folder (like %TEMP%) to achieve the silent bypass.

New Profile: You can run DLLHijackHunter.exe --profile uac-bypass to exclusively hunt for these vectors.

You can grab the self-contained binary from the latest release: https://github.com/ghostvectoracademy/DLLHijackHunter


文章来源: https://www.reddit.com/r/netsecstudents/comments/1rljg59/dllhijackhunter_v120_now_with_automated_uac/
如有侵权请联系:admin#unsafe.sh