18.DLL-injection
Windows API Calls (DLL Injection)
# Open a handle to the target process
OpenProcess
# Allocate memory in the target process
VirtualAllocEx
# Write data into the allocated memory
WriteProcessMemory
# Retrieve the address of an exported function from a DLL
GetProcAddress
# Create a thread in the target process
CreateRemoteThread
# Load a DLL into the process
LoadLibrary
# Free the loaded DLL
FreeLibraryRegistry (DLL Hijacking)
Process Monitoring (DLL Hijacking)
Key Concepts:
Last updated