TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Early Cascade Injection: From Windows process creation to stealthy injection

123 点作者 wsintra20226 个月前

4 条评论

wslh6 个月前
Great! We have been working on Windows Process (and COM) injection since 2003 [1][2][3]. I need to talk with the current development team about reviewing it with the EDR-Preloading technique. We have a driver also that suspends a new process before hooking it, we also hook existing processes.<p>Business-wise our work on this went down once Microsoft Detours was made FOSS even when our products has other capabilities. A good old thread is here [4].<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;Deviare2">https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;Deviare2</a><p>[2] <a href="https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;Deviare-InProc">https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;Deviare-InProc</a><p>[3] <a href="https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;RemoteBridge">https:&#x2F;&#x2F;github.com&#x2F;nektra&#x2F;RemoteBridge</a><p>[4] <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;programming&#x2F;comments&#x2F;22crn0&#x2F;gpl_alternative_library_to_microsoft_detours_for&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;programming&#x2F;comments&#x2F;22crn0&#x2F;gpl_alt...</a>
Dwedit6 个月前
Not all overriding and detouring is malicious. For instance, Steam detours Direct3D every time you launch a game in order to set up the steam overlay.
评论 #42096661 未加载
anaisbetts6 个月前
I&#x27;m surprised the call to WriteProcessMemory or creating suspended processes isn&#x27;t being picked up, it usually gets you a lot of points on the &quot;Detect binary as malware heuristic&quot; detector
评论 #42096819 未加载
评论 #42096883 未加载
评论 #42100859 未加载
purplehat_6 个月前
This is a great writeup, thanks for posting it. The post mentions Early Bird APC is a fairly recent development, around 2018, but process injection has been around for a long time. Is there any theoretical work being done towards locking down processes against injection in more robust ways than simply making sure there is no temporal chance to inject a malicious code? I’m thinking something along the lines of CFI, but for processes instead of subroutines, would be useful if it could be made to work.
评论 #42096315 未加载