Registry Keys for Creating SHIM Databases
Application Shimming, Event Triggered Execution
Application Shimming, Event Triggered Execution
DLL Search Order Hijacking, DLL Side-Loading, Hijack Execution Flow
Password Spraying, Brute Force
Modify Registry
System Network Configuration Discovery