I have an executable which loads my Custom DLLs while executing various features.
Some hackers have injected DLL and are able to tamper with the client. I have read that we can prevent the technique (CreateRemoteThread which calls LoadLibrary) by hooking LoadLibrary. In the hook we check against a list of DLL names that we know are part of the process and that may be loaded.
I would like to know if someone have implemented such solution and can help me out?