This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the code exploitation process. In this article, we look at one of the primary infection steps used to compromise a Windows host, DLL injection.