Code Injection - Process PE Injection Basics
Code injection series part 1
1 September 2019 22:33 0 messages
Prerequisites: This document requires some knowledge about Windows system programming.
License : Copyright Emeric Nasi (@EmericNasi), some rights reserved
This work is licensed under a Creative Commons Attribution 4.0 International License.
I Introduction
In this first part of the injection series, I am presenting how to inject and run code in a target process on Windows using the method called PE injection. This method allows a .exe file to inject and run itself in the memory of another process. This is a refresh of the 2014 post working on Windows 10. You can view it as a simple introduction to PE injection for beginners.
If you wish to read more about this, the document can be downloaded in a PDF format
Also in this section
2 September 2020 – Code Injection - Weaponize GhostWriting Injection
1 December 2019 – Code Injection - Disable Dynamic Code Mitigation (ACG)
1 December 2019 – Code Injection - Exploit WNF callback
5 September 2019 – Code Injection - Bypass start address protection