![]() ![]() Process injection is a method of executing arbitrary code in the address space of a separate live process.Īllocates virtual memory in a remote process Modifies auto-execute functionality by setting/creating a value in the registry ![]() Opens the Kernel Security Device Driver (KsecDD) of WindowsĪdding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Installs hooks/patches the running process ![]() Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Command-line interfaces provide a way of interacting with computer systems and is a common feature across many types of operating system platforms. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |