From cfb91500d78c8e0538df8dadb38915181063fe31 Mon Sep 17 00:00:00 2001 From: mether049 Date: Sun, 5 Jan 2020 22:52:19 +0900 Subject: [PATCH] Update malware-tech_ref_and_memo.md --- malware-tech_ref_and_memo.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/malware-tech_ref_and_memo.md b/malware-tech_ref_and_memo.md index c3e0836..e775ff1 100644 --- a/malware-tech_ref_and_memo.md +++ b/malware-tech_ref_and_memo.md @@ -10,6 +10,8 @@ [HUNTING PROCESS INJECTION BY WINDOWSAPI CALLS (2019-11)](https://malwareanalysis.co/wp-content/uploads/2019/11/Hunting-Process-Injection-by-Windows-API-Calls.pdf)
- 図で分かりやすく説明
[Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques](https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process) + - プログラムベースの説明 +[Code & Process Injection,Red Teaming Experiments](https://ired.team/offensive-security/code-injection-process-injection) ### Dll Injection - 正規プロセス探索->プロセスのハンドル取得->メモリ領域確保->悪性DLL注入->実行