Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:it-security:blog:shellcode_injection-1 [2024/04/26 14:02] – created psycore | en:it-security:blog:shellcode_injection-1 [2024/08/02 12:34] (current) – psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{tag> | + | {{tag> |
====== Shellcode Injection Part 1 ====== | ====== Shellcode Injection Part 1 ====== | ||
- | In this series of articles, we look at shellcode, how to inject it into processes and some techniques for obfuscating binary files. In the first part, we look at how to inject shellcode from a local process. ausführt.((https:// | + | In this series of articles, we look at shellcode, how to inject it into processes and some techniques for obfuscating binary files. In the first part, we look at how to inject shellcode from a local process. ausführt. In addition, we disguise the program so that Defender no longer recognises it as a threat. |
You can find all the required files in the [[en: | You can find all the required files in the [[en: | ||
Line 274: | Line 274: | ||
\\ | \\ | ||
\\ | \\ | ||
+ | |||
+ | ===== References ===== | ||
+ | |||
+ | * [[https:// | ||
+ | |||
~~DISCUSSION~~ | ~~DISCUSSION~~ |