mirror of
https://github.com/nganhkhoa/malware.git
synced 2024-06-10 21:32:07 +07:00
Update malware-tech_ref_and_memo.md
This commit is contained in:
parent
731ea213f4
commit
5920f8f987
@ -18,8 +18,10 @@
|
|||||||
[Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques](https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process)
|
[Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques](https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process)
|
||||||
- プログラムベースの説明<br>
|
- プログラムベースの説明<br>
|
||||||
[Code & Process Injection,Red Teaming Experiments](https://ired.team/offensive-security/code-injection-process-injection)
|
[Code & Process Injection,Red Teaming Experiments](https://ired.team/offensive-security/code-injection-process-injection)
|
||||||
- 環境変数とコマンドラインのProcess Injectionへの活用
|
- 環境変数とコマンドラインのProcess Injectionへの活用<br>
|
||||||
[Windows Process Injection: Command Line and Environment Variables](https://modexp.wordpress.com/2020/07/31/wpi-cmdline-envar/)
|
[Windows Process Injection: Command Line and Environment Variables](https://modexp.wordpress.com/2020/07/31/wpi-cmdline-envar/)<br>
|
||||||
|
- 各種Injectionについて<br>
|
||||||
|
[Windows Process Injection](https://github.com/odzhan/injection)<br>
|
||||||
|
|
||||||
### Dll Injection
|
### Dll Injection
|
||||||
- 正規プロセス探索->プロセスのハンドル取得->メモリ領域確保->悪性DLL注入->実行
|
- 正規プロセス探索->プロセスのハンドル取得->メモリ領域確保->悪性DLL注入->実行
|
||||||
|
Loading…
Reference in New Issue
Block a user