Overview
Explore undocumented hollow process injection techniques used by malware authors to evade detection in this 55-minute Black Hat conference talk. Delve into the world of code injection methods that allow malicious software to blend in with legitimate processes, going beyond the well-known procedures for detecting hollow process injection. Gain valuable insights into advanced evasion tactics employed by cybercriminals and enhance your understanding of cutting-edge malware techniques to improve your cybersecurity defenses.
Syllabus
What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection
Taught by
Black Hat