all InfoSec news
Malware development trick 38: Hunting RWX - part 2. Target process investigation tricks. Simple C/C++ example
Malware Analysis, News and Indicators - Latest topics malware.news
﷽
Hello, cybersecurity enthusiasts and white hackers!
In one of my previous posts, I described a process injection method using RWX-memory searching logic. Today, I will apply the same logic, but with a new trick.
As you remember, the method is simple: we enumerate the presently running target processes on the victim’s system, scan through their allocated memory blocks to see if any are protected with RWX, and then write our payload to this memory block.
practical example
Today …
cybersecurity development hackers hello hunting injection investigation logic malware malware analysis malware development memory posts process process injection rwx simple target today trick