![]() ![]() References security related windows services Processes may automatically execute specific binaries as part of their functionality or to perform other actions. ![]() Opens the Kernel Security Device Driver (KsecDD) of Windows Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. ![]() Installs hooks/patches the running process Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |