all InfoSec news
ProcessStomping - A Variation Of ProcessOverwriting To Execute Shellcode On An Executable'S Section
Dec. 22, 2023, 11:30 a.m. | noreply@blogger.com (Unknown)
KitPloit - PenTest Tools! www.kitploit.com
A variation of ProcessOverwriting to execute shellcode on an executable's section
What is it
For a more detailed explanation you can read my blog post
Process Stomping, is a variation of hasherezade’s Process Overwriting and it has the advantage of writing a shellcode payload on a targeted section instead of writing a whole PE payload over the hosting process address space.
These are the main steps of the ProcessStomping technique:
- CreateProcess - setting the Process Creation Flag to CREATE_SUSPENDED (0x00000004) …
blog blog post payload process processes shellcode srdi what is writing
More from www.kitploit.com / KitPloit - PenTest Tools!
Galah - An LLM-powered Web Honeypot Using The OpenAI API
3 days, 23 hours ago |
www.kitploit.com
CSAF - Cyber Security Awareness Framework
6 days, 23 hours ago |
www.kitploit.com
HackerInfo - Infromations Web Application Security
1 week, 1 day ago |
www.kitploit.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
SITEC- Systems Security Administrator- Camp HM Smith
@ Peraton | Camp H.M. Smith, HI, United States
Cyberspace Intelligence Analyst
@ Peraton | Fort Meade, MD, United States
General Manager, Cybersecurity, Google Public Sector
@ Google | Virginia, USA; United States
Cyber Security Advisor
@ H&M Group | Stockholm, Sweden
Engineering Team Manager – Security Controls
@ H&M Group | Stockholm, Sweden