Traditional injection approaches – code and DLL
First of all, we should talk about code injection. What does code injection mean? What’s the point?
The code injection technique is a simple way for one process – in this case, malware – to add code to another process that is already working.
For example, your malware could be an injector from a phishing attack or a Trojan that you successfully gave to your target victim. It could also be anything that runs your code. And for some reason, you might want to run your payload in a different process.
Where am I going with this? We won’t talk about making a Trojan in this chapter, but let’s say that your code was run inside the firefox.exe
executable file, which has a limited amount of time to run. Let’s say you have successfully gotten a remote reverse shell, but you know that your target has closed firefox.exe
. If you want to keep your session going, you must switch to another process...