Completed
Module Shifting - Restore modified bytes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Improving the Stealthiness of Memory Injection Techniques Using Python Ctypes
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Memory Injection Definition
- 4 Memory Injection - Purposes
- 5 Memory Injection - Main categories
- 6 Code injection - Common techniques
- 7 PE injection - Common techniques
- 8 Process Manipulation - Common technique
- 9 Memory Injection - Moving Parts
- 10 Setting the constraints - Injection
- 11 Setting the constraints - Payload
- 12 Testing with Memory scanners
- 13 Starting Point - Python Memory Module
- 14 PythonMemoryModule - Pros and cons
- 15 Next step - Module Overloading
- 16 Module Overloading - loCs
- 17 Next step - Module Stomping
- 18 Module Stomping locs
- 19 Module Shifting - Key Points
- 20 Module Shifting - Restore modified bytes
- 21 Detection Opportunities
- 22 Main Takeaways