Exploring Various Malware Injection Attacks
When we talk about malware injection, we’re referring to the technique of injecting malicious code into a running program. This type of attack can be difficult to detect and defend against because the malware can piggyback on an already-trusted program. It can use the legitimate program’s access to the system to cause damage or steal data. In this chapter, we’ll explore the different ways this type of attack can be carried out, and how you can protect yourself from it.
In this chapter, we’re going to cover the following main topics:
- Traditional injection approaches – code and DLL
- Exploring hijacking techniques
- Understanding asynchronous procedure call (APC) injection
- Mastering API hooking techniques