This is a decommissioned version of ERA which is running to enable completion of migration processes. All new collections and items and all edits to existing items should go to our new ERA instance at https://ualberta.scholaris.ca - Please contact us at erahelp@ualberta.ca for assistance!
- 236 views
- 1886 downloads
Memory Injection Attack
-
- Author(s) / Creator(s)
-
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been achieved in a virtual environment using VMware. Kali Linux has been used as an attacker that tries to exploit and gain access to a running application (Notepad in our case) on windows host using Metasploit framework. Various tools and methods have been used to detect and mitigate the attack.
-
- Date created
- 2019-03-08
-
- Subjects / Keywords
-
- Type of Item
- Report