Process injection
This technique aims at increasing privilege and/or escaping the protections applied to the processes
Last updated
Was this helpful?
This technique aims at increasing privilege and/or escaping the protections applied to the processes
Last updated
Was this helpful?
This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me:
Instead of simply executing the shellcode, it has become common to find tricks to hide its active load. The classic schema looks like this:
After the malicious code is injected into a legitimate process, attackers also can access legitimate processes' resources such as process memory, system/network resources, and elevated privileges
picussecurity.com
Process injection exists in many forms, often based on legitimate services.
The techniques mainly used are :
all these methods and many others are also described in Ired's article :