Abusing Windows Internals

Introduction

Abusing Processes

Expanding Process Abuse

Abusing Process Components

Abusing DLLs

Memory Execution Alternatives

Case Study in Browser Injection and Hooking

Conclusion

Last updated