Want to know how to identify DLL pre-loading attacks but feel like you aren't geeky enough ? we will do this with very simple techniques your granny and grandpa could do. investigate installation processes and file handling behaviour, then exploit opportunities with metasploit.
L2 Techies, Pentesters, hackers, Any Geek
Requirements: A Windows environment with procmon, a Linux environment with metasploit (virtualbox/vmware, however you cut it)