Slide 6
Slide 6 text
Basics – code implants and in-memory patches
• Malicious and non-malicious purposes
• Process impersonation (Process Hollowing etc) –
full PE is replaced/implanted
• Micro-patching applications without recompiling
code
• Packed executables, self-modifying code
• Hooking: userland rootkits, data interception,
sandboxes