![]() Installs hooks/patches the running processĪdversaries may use ] to hide artifacts of an intrusion from analysis. ![]() Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. ![]() ![]() Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |