10 Process Injection Techniques: Technical Survey Of Common & Trending Process Injection Techniques

Discussion in 'other security issues & news' started by WildByDesign, Jul 18, 2017.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
  2. guest

    guest Guest

    But first the kernel driver has to be installed and this can be monitored:
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
    Correct, but my point is that kernel drivers can still be a threat even on Windows 64 bit. They can't modify most of the Win OS kernel anymore, but they can still inject code, hide files and folders and probably even bypass firewalls.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.