Trusted Path Bypass via Windows Directory Spoofing
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification.
Severity
Critical
Detection
Execution Mode
realtime
Log Sources
Windows
Author
@Swachchhanda Shrawan Poudel (Nextron Systems)


