![]() Process injection is a method of executing arbitrary code in the address space of a separate live process.įound a string that may be used as part of an injection method ![]() Installs hooks/patches the running process Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Spawns a process via the service control manager ![]() When operating systems boot up, they can start programs or applications called services that perform background system functions. Opens the Kernel Security Device Driver (KsecDD) of Windows Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |