This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
- 247 views
- 2011 downloads
Memory Injection Attack
-
- Author(s) / Creator(s)
-
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been achieved in a virtual environment using VMware. Kali Linux has been used as an attacker that tries to exploit and gain access to a running application (Notepad in our case) on windows host using Metasploit framework. Various tools and methods have been used to detect and mitigate the attack.
-
- Date created
- 2019-03-08
-
- Subjects / Keywords
-
- Type of Item
- Report