A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows

A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows

| | Threat Research
Introduction The topic of memory corruption exploits can be a difficult one to initially break in to. When I first began to explore this topic on the Windows OS I was immediately struck by the ... Read More
Masking Malicious Memory Artifacts – Part III: Bypassing Defensive Scanners

Masking Malicious Memory Artifacts – Part III: Bypassing Defensive Scanners

|
Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More
Masking Malicious Memory Artifacts – Part II: Insights from Moneta

Masking Malicious Memory Artifacts – Part II: Insights from Moneta

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More
Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing

Masking Malicious Memory Artifacts – Part I: Phantom DLL Hollowing

Introduction With fileless malware becoming a ubiquitous feature of most modern Red Teams, knowledge in the domain of memory stealth and detection is becoming an increasingly valuable skill to add to both an attacker and ... Read More