all InfoSec news
Video Blog: Using DLL Persist to Avoid Detection
Sept. 12, 2022, 2:02 p.m. | Nathan Noll
TrustedSec www.trustedsec.com
During an Incident Response case, the TrustedSec IR team came across a novel method used by an attacker to maintain access to the target’s servers. After gaining access to the systems, the attacker then modified a DLL required by a service to include malicious code. This video demonstrates a similar process for embedding malicious code...
The post Video Blog: Using DLL Persist to Avoid Detection appeared first on TrustedSec.
blog detection dll incident response incident response & forensics video
More from www.trustedsec.com / TrustedSec
From Chaos to Clarity: Organizing Data With Structured Formats
3 weeks, 3 days ago |
www.trustedsec.com
Introducing PCI's New Self-Assessment Questionnaire
1 month, 1 week ago |
www.trustedsec.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
SOC Cyber Threat Intelligence Expert
@ Amexio | Luxembourg, Luxembourg, Luxembourg
Systems Engineer - SecOps
@ Fortinet | Dubai, Dubai, United Arab Emirates
Ingénieur Cybersécurité Gouvernance des projets AMR H/F
@ ASSYSTEM | Lyon, France
Senior DevSecOps Consultant
@ Computacenter | Birmingham, GB, B37 7YS