Source |
LogPoint |
Identifiant |
8069142 |
Date de publication |
2022-11-17 14:16:51 (vue: 2022-11-17 16:05:44) |
Titre |
Detect, prevent and respond: A deep dive on malicious DLLs |
Texte |
>by Nilaa Maharjan, Security ResearchIndexClick the links and navigate to each section:What are DLLs?DLLs are a persistent attack vectorWhat is DLL misuse attack?DLL hijacking is a stealthy, persistent attackValue to you:Investigating DLL hijacking using LogpointAlert: Phantom DLL loaded for persistence or privilege escalationFour golden rules when hunting DLLsThe below queries can help hunt for DLLsHow [...]
|
Envoyé |
Oui |
Condensat |
>by are attack attackvalue below can deep detect dive dll dlls dllshow dllsthe each escalationfour golden help hijacking hunt hunting links loaded logpointalert: maharjan malicious misuse navigate nilaa persistence persistent phantom prevent privilege queries researchindexclick respond: rules section:what security stealthy using vectorwhat when you:investigating |
Tags |
|
Stories |
|
Notes |
|
Move |
|