카테고리 없음
[자료] Pentesting IoT devices
https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persi..