DLL injection

Results: 13



#Item
1Computing / Software / System software / Dynamic-link library / Library / DLL injection

LoadLibrary(filename)   kernel32.dll   LoadLibrary(filename)  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-04 21:22:54
2DLL injection / CrowdStrike / Shellcode / Rootkit / Hooking / Malware

ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2012-06-29 08:39:58
3Directory services / Control flow / DLL injection / Windows API / Lightweight Directory Access Protocol / Dynamic-link library / Exception handling / ASP.NET / Hooking / Windows Registry / Code injection / Active Directory

HITB Magazine Keeping Knowledge Free Volume 1, Issue 1, JanuaryCover Story

Add to Reading List

Source URL: magazine.hitb.org

Language: English - Date: 2014-01-06 00:11:33
4Computing / Computer architecture / Software / Windows NT kernel / Computing platforms / DLL injection / Windows API / Native API / Dynamic-link library / Architecture of Windows NT / Windows Registry / Microsoft Windows

Rethinking the Library OS from the Top Down

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2012-02-04 20:18:03
5Computing / Software engineering / Computer programming / Data types / Control flow / C / DLL injection / Hooking / WindowProc / Subroutines / Callback / Typedef

MWR Labs Walkthrough Windows Kernel Exploitation 101: Exploiting CVESam Brown

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-05 16:42:45
6Cyberwarfare / Computer security / Polymorphic code / Rootkit / Computer virus / Shellcode / Code injection / VirusTotal.com / DLL injection / System software / Malware / Antivirus software

Bypass Antivirus Dynamic Analysis Limitations of the AV model and how to exploit them Date of writing: [removed]Author: Emeric Nasi – emeric.nasi[at]sevagas.com Website: http://www.sevagas.com/

Add to Reading List

Source URL: www.gironsec.com

Language: English - Date: 2014-08-25 06:22:22
7System software / Cross-platform software / Relational database management systems / Oracle Database / Rootkit / Database management system / Password / Oracle Corporation / DLL injection / Software / Malware / Computing

Oracle post exploitation techniques László Tóth [removed] Disclaimer

Add to Reading List

Source URL: www.soonerorlater.hu

Language: English - Date: 2010-09-21 07:49:15
8Computer file formats / Shellcode / Malware / DLL injection / Dynamic-link library / Portable Executable / Metasploit Project / Position-independent code / Library / Software / Computing / System software

 www.harmonysecurity.com  [removed] Reflective DLL Injection v1.0

Add to Reading List

Source URL: www.harmonysecurity.com

Language: English - Date: 2012-09-06 08:31:43
9Malware / Debuggers / Computer security / Control flow / Hooking / DLL injection / Rootkit / Dynamic-link library / OllyDbg / Computing / Software / System software

Detecting “Certified Pre-owned” Software Tyler Shields, Veracode Chris Wysopal, Veracode March 25, 2009 Introduction

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
10Debuggers / Debugging / Breakpoint / Assemblers / Software testing / Hooking / Fuzz testing / DLL injection / Debug / Computer programming / Computing / Software engineering

INDEX A C access violation handlers, 60

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:21
UPDATE