Malware attacks/techniques explained.
- Self-injection
- Process injection
- Local DLL injection/Self-DLL injection
- Remote DLL injection/DLL injector
- Using executable resources to hide images with embedded shellcode
- DLL Proxing
- Default txt extension hijacking
- PE headers eradication
- Dynamically filling PE code with NOPs