[SANS ISC] Live Patching Windows API Calls Using PowerShell

I published the following diary on isc.sans.edu: “Live Patching Windows API Calls Using PowerShell“:

It’s amazing how attackers can be imaginative when it comes to protecting themselves and preventing security controls to do their job. Here is an example of a malicious PowerShell script that patches live a DLL function to change the way it works (read: “to make it NOT work”). This is not a new technique but it has been a while that I did not find it so, it deserves a quick review… [Read more]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.