en:it-security:blog:shellcode_injection-1

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:it-security:blog:shellcode_injection-1 [2024/04/26 13:57] psycoreen:it-security:blog:shellcode_injection-1 [2024/04/26 14:02] (current) psycore
Line 4: Line 4:
 In this series of articles, we look at shellcode, how to inject it into processes and some techniques for obfuscating binary files. In the first part, we look at how to inject shellcode from a local process. ausführt.((https://www.ired.team/offensive-security/code-injection-process-injection/process-injection)) In addition, we disguise the program so that Defender no longer recognises it as a threat. In this series of articles, we look at shellcode, how to inject it into processes and some techniques for obfuscating binary files. In the first part, we look at how to inject shellcode from a local process. ausführt.((https://www.ired.team/offensive-security/code-injection-process-injection/process-injection)) In addition, we disguise the program so that Defender no longer recognises it as a threat.
  
-You can find all the required files in the [[it-security:blog:shellcode_injection#Repository|repository]]+You can find all the required files in the [[en:it-security:blog:shellcode_injection-1#Repository|repository]]
 \\ \\
 \\ \\
  • en/it-security/blog/shellcode_injection-1.1714132650.txt.gz
  • Last modified: 2024/04/26 13:57
  • by psycore