Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

ATT&CK Deep Dive: Process Injection

Автор: Red Canary, a Zscaler company

Загружено: 2020-06-25

Просмотров: 12196

Описание:

Process Injection encompasses a wide array of malicious behaviors that offer adversaries an inconspicuous method of evading defensive controls, elevating their privilege level, or otherwise executing arbitrary code. It’s so broad that in the next ATT&CK release, MITRE is recategorizing the technique into 11 sub-techniques.

As such, this is the perfect time for an in-depth, technical conversation exploring the ways that adversaries leverage Process Injection, what malicious process injection looks like, and how you can detect it.

Show Notes:
01:25 Panelist Introduction

02:10 What Red Canary Does

02:35 Process Injection Definition

02:48 “Process injection is a way of running arbitrary code in another process’s memory space.” – Adam

03:30 Why Leverage Process Injection

03:50 “It can be a very good way to evade defenders and defensive controls that are focused around specific tools.” – Adam

04:55 Sub-techniques of Process Injection

05:20 “Process injection, which is a fairly broad technique, has been broken out into 11 different sub-techniques which are more specific techniques or ways of actually doing process injection.” – Adam

05:45 Webinar Agenda

07:11 Portable Executable Injection

08:09 “The ability to inject that into another process and then invoking it by spawning a new thread.” – Matt

09:40 “This technique offers an attacker particular flexibility in that it facilitates direct injection into their target.” – Matt

10:57 Ramnit

11:15 “In the case of Ramnit, it injects a traditional DLL into a browser process.” – Matt

13:55 Observing PE Injection

14:14 “What are the absolute minimum requirements an attacker has imposed in order to successfully carry out the attack technique?” – Matt

17:05 Detecting PE Injection

18:15 “Since they’re already writing their own position-independent code, there’s no hard requirement that they must write a PE header into the memory space of another process, but a lot of malware does.” – Matt

21:30 Thread Local Storage

22:29 “Although it is kind of uncommon, it can be a successful anti-analysis technique because typically analysis is going to start at the entry point of the PE, and this malware is going to get executed before that is reached.” – Erika

22:52 Ursnif

23:05 “It’s often spread via malicious Office documents” – Erika

23:23 Observing Malicious TLS Callbacks

23:29 “Within the PE header itself, there is a TLS directory which contains information about TLS data objects. These thread local storage objects basically allow each thread to have its own static data area for custom variables, or custom thread initialization routines that they want to employ.” – Erika

28:29 Detecting Malicious TLS Callbacks

29:22 “We talked about some of the APIs that are used by this technique, you can obviously detect the usage of those, but the usage of any one of those by itself is not going to indicate malicious activity.” – Erika

30:38 Process Hollowing

31:00 “It allows an attacker to carve out the executable section of a legitimate or benign process and replace it with their own payload.” – David

33:42 Process Hollowing: Generalized Technique

36:05 “Once the attacker has obtained the PE address, the third step is to perform the hollowing itself.” – David

41:55 Trickbot

42:32 “What’s interesting for us as technical defenders is that we use a number of varied techniques taking shape.” – David

43:52 Process Hollowing: Trickbot

45:30 “They create a section that describes their unpacked code. This is created within the originator process, meaning within the malware process itself. They create a new section that describes the unpacked code to inject or make resident within the hollowed process.” – David

47:52 Detecting Process Hollowing

51:12 “It’s difficult to get a robust detection at scale.” – David

52:16 Linux

57:09 “We only had these three Linux-only techniques in ATT&CK today.” – Adam

57:26 MacOS

57:38 “Injection isn’t seen in malware on the Mac platform, and there are a few reasons for that. The most prevalent being that it is much harder than getting the user to click on something and type in their password.” – Erika

01:00:52 Mitigating Process Injection

1:01:02 “There is no specific mitigation against all forms of process injection.” – Matt

01:04:05 Questions & Answers

ATT&CK Deep Dive: Process Injection

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

ATT&CK Deep Dive: Lateral Movement Pt. 2 (Shutting Down Lateral Movement)

ATT&CK Deep Dive: Lateral Movement Pt. 2 (Shutting Down Lateral Movement)

Malware Theory - Process Injection

Malware Theory - Process Injection

ATT&CK® Deep Dive: How to Detect Rootkits

ATT&CK® Deep Dive: How to Detect Rootkits

Начало работы с Ghidra: анализ процесса извлечения шелл-кода из Maldoc

Начало работы с Ghidra: анализ процесса извлечения шелл-кода из Maldoc

DLL Injection with CreateRemoteThread

DLL Injection with CreateRemoteThread

Dirty Vanity: A New Approach to Code Injection & EDR Bypass

Dirty Vanity: A New Approach to Code Injection & EDR Bypass

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1

Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1

Needles Without The Thread: Threadless Process Injection - Ceri Coburn

Needles Without The Thread: Threadless Process Injection - Ceri Coburn

License to Kill: Malware Hunting with the Sysinternals Tools

License to Kill: Malware Hunting with the Sysinternals Tools

Sha1-Hulud, MacSync Stealer, ScreenConnect: что нам известно!

Sha1-Hulud, MacSync Stealer, ScreenConnect: что нам известно!

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Putting MITRE ATT&CK™ into Action with What You Have, Where You Are presented by Katie Nickels

Demystifying Process Injection by Keith Learmonth

Demystifying Process Injection by Keith Learmonth

ATT&CK Deep Dive: Lateral Movement Pt. 1

ATT&CK Deep Dive: Lateral Movement Pt. 1

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Process Injection Explained: Windows OS Fundamentals for Cybersecurity | Part 1

Process Injection Explained: Windows OS Fundamentals for Cybersecurity | Part 1

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Conversation with Elon Musk | World Economic Forum Annual Meeting 2026

Fileless Malware: How It Works

Fileless Malware: How It Works

Windows Internals Crash Course

Windows Internals Crash Course

What is Process Hollowing?

What is Process Hollowing?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com