악성코드분석소

  • 홈
  • 태그
  • 방명록

카테고리 없음

다양한 Process Injection

wsoh9812 2022. 3. 31. 20:05

 

- PROPagate

http://www.hexacorn.com/blog/2017/10/26/propagate-a-new-code-injection-trick/

 

Hexacorn | Blog PROPagate – a new code injection trick

October 26, 2017 in Anti-*, Code Injection, Compromise Detection, EDR, Incident Response, Malware Analysis, Reversing, Sandboxing Executing code inside a different process space is typically achieved via an injected DLL /system-wide hooks, sideloading, etc

www.hexacorn.com

 

 

- FunctionStomping Injection

https://www.ired.team/offensive-security/code-injection-process-injection/modulestomping-dll-hollowing-shellcode-injection

 

Module Stomping for Shellcode Injection - Red Teaming Experiments

unsigned char shellcode[] =...

www.ired.team

 

 

 

 

https://rninche01.tistory.com/entry/%EB%8B%A4%EC%96%91%ED%95%9C-%EC%9D%B8%EC%A0%9D%EC%85%98-%EA%B8%B0%EC%88%A0

 

 

'카테고리 없음'의 다른글

  • 현재글다양한 Process Injection
댓글
프로필사진

  • 분류 전체보기 (51)
    • Malware (14)
    • WindowsDriver (5)
    • ETC (21)
    • analysis TIP (2)
    • CTF (5)

Tag

Driver Signature Enforcement, DLL 하이재킹, lazarus, DSE, hfiref0x, NalDrv.sys, uac bypass, DLL Hijacking, 악성코드 분석, Kernel Driver, Atombombing, 필터드라이버, windbg명령어, uac-bypass, 윈도우 드라이버, 악성코드 분석보고서, uacbypass, privilege escalation, LAZARUS MALWARE, 악성코드,

최근글과 인기글

  • 최근글
  • 인기글

최근댓글

공지사항

페이스북 트위터 플러그인

  • Facebook
  • Twitter

Archives

Calendar

«   2025/07   »
일 월 화 수 목 금 토
1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31

방문자수Total

  • Today :
  • Yesterday :

Copyright © Kakao Corp. All rights reserved.

티스토리툴바