docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

Preview meta tags from the docs.microsoft.com website.

Linked Hostnames

9

Thumbnail

Search Engine Appearance

Google

https://docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

Dynamic-Link Library Security - Win32 apps

When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.



Bing

Dynamic-Link Library Security - Win32 apps

https://docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.



DuckDuckGo

https://docs.microsoft.com/en-us/windows/desktop/Dlls/dynamic-link-library-security

Dynamic-Link Library Security - Win32 apps

When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.

  • General Meta Tags

    49
    • title
      Dynamic-Link Library Security - Win32 apps | Microsoft Learn
    • charset
      utf-8
    • viewport
      width=device-width, initial-scale=1.0
    • color-scheme
      light dark
    • description
      When an application dynamically loads a dynamic-link library without specifying a fully qualified path name, Windows attempts to locate the DLL by searching a well-defined set of directories in a particular order, as described in Dynamic-Link Library Search Order. If an attacker gains control of one of the directories on the DLL search path, it can place a malicious copy of the DLL in that directory. This is sometimes called a DLL preloading attack or a binary planting attack.
  • Open Graph Meta Tags

    6
    • og:type
      website
    • og:image:alt
      Microsoft Learn
    • og:image
      https://learn.microsoft.com/en-us/media/open-graph-image.png
    • og:title
      Dynamic-Link Library Security - Win32 apps
    • og:url
      https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security
  • Twitter Meta Tags

    2
    • twitter:card
      summary_large_image
    • twitter:site
      @MicrosoftLearn
  • Link Tags

    6
    • canonical
      https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-security
    • dns-prefetch
      //target.microsoft.com
    • dns-prefetch
      //microsoftmscompoc.tt.omtrdc.net
    • preconnect
      //mscom.demdex.net
    • preload
      /static/third-party/adobe-target/at-js/2.9.0/at.js

Links

26