Dll Hijack Auditor is the smart tool to Audit against the Dll Hijacking Vulnerability in any Windows application.
This is one of the critical security issue affecting almost all Windows systems. Though most of the apps have been fixed, but still many Windows applications are susceptible to this vulnerability which can allow any attacker to completely take over the system.
DllHijackAuditor helps in discovering all such Vulnerable Dlls in a Windows application which otherwise can lead to successful exploitation resulting in total compromise of the system.
With its simple GUI interface DllHijackAuditor makes it easy for anyone to instantly perform the auditing operation. It also presents detailed technical Audit report which can help the developer in fixing all vulnerable points in the application.
DllHijackAuditor is a standalone portable application which also comes with Installer for local Installation & Uninstallation of software.
It works on wide range of platforms starting from Windows XP to latest operating system, Windows 8.
|
Here are some of the smart features of DllHijackAuditor, |
- Directly & Instantly audit any Windows Application.
- Allows complete testing to uncover all Vulnerable points in the target Application
- Smart Debugger based 'Interception Engine' for consistent and efficent performance without intrusion.
- Support for specifying as well as auditing of application with custom & multiple Extensions.
- Timeout Configuration to alter the waiting time for each Application.
- Generates complete auditing report (in HTML format) about all vulnerable hijack points in the Application.
- GUI based tool, makes it easy for anyone with minimum knowledge to perform the auditing operation.
- Does not require any special privilege for auditing of the application (unless target application requires)
- Free from Antivirus as it does not use any shellcodes or exploit codes which trigger Antivirus to terminate the operation.
- Fully portable tool which can be run directly on any system.
- Support for local Installation and uninstallation of the software.
|
|
Here are the screenshots of DllHijackAuditor in action showing various phases of Auditing operation. |
|
Screenshot 1: DllHijackAuditor ready for the auditing operation |
|
|
|
|
Screenshot 2: DllHijackAuditor after the completion of Phase 1 (Vulnerability Testing) of auditing operation of WireShark.exe |
|
|
|
|
Screenshot 3: DllHijackAuditor after the completion of Phase 2 (Exploitation) of auditing operation of WireShark.exe |
|
|
|
|
Screenshot 4: Complete Audit report generated by DllHijackAuditor as last phase of auditing operation of WireShark.exe |
|
|