Improving the Stealthiness of Memory Injection Techniques Using Python Ctypes

Improving the Stealthiness of Memory Injection Techniques Using Python Ctypes

x33fcon via YouTube Direct link

Module Shifting - Restore modified bytes

20 of 22

20 of 22

Module Shifting - Restore modified bytes

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Improving the Stealthiness of Memory Injection Techniques Using Python Ctypes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Memory Injection Definition
  4. 4 Memory Injection - Purposes
  5. 5 Memory Injection - Main categories
  6. 6 Code injection - Common techniques
  7. 7 PE injection - Common techniques
  8. 8 Process Manipulation - Common technique
  9. 9 Memory Injection - Moving Parts
  10. 10 Setting the constraints - Injection
  11. 11 Setting the constraints - Payload
  12. 12 Testing with Memory scanners
  13. 13 Starting Point - Python Memory Module
  14. 14 PythonMemoryModule - Pros and cons
  15. 15 Next step - Module Overloading
  16. 16 Module Overloading - loCs
  17. 17 Next step - Module Stomping
  18. 18 Module Stomping locs
  19. 19 Module Shifting - Key Points
  20. 20 Module Shifting - Restore modified bytes
  21. 21 Detection Opportunities
  22. 22 Main Takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.