# Hijack Execution Flow

## COR\_PROFILER

## DLL Search Order Hijacking

## DLL Side-Loading

## Dylib Hijacking

## Executable Installer File Permissions Weakness

## LD\_PRELOAD

## Path Interception by PATH Environment Variable

## Path Interception by Search Order Hijacking

## Path Interception by Unquoted Path

## Services File Permissions Weakness

## Services Registry Permissions Weakness
