Communities and Collections
Usage
- 172 views
- 1036 downloads
Memory Injection Attack
-
- Author(s) / Creator(s)
-
This project studies the various techniques used in memory injection attack and how to detect/avoid them using various network security monitoring (NSM) tools. Among various available techniques of memory injection, Reflective DLL injection has been studied in detail. The above objective has been achieved in a virtual environment using VMware. Kali Linux has been used as an attacker that tries to exploit and gain access to a running application (Notepad in our case) on windows host using Metasploit framework. Various tools and methods have been used to detect and mitigate the attack.
-
- Date created
- 2019-03-08
-
- Subjects / Keywords
-
- Type of Item
- Report