Talk

Uncommon process injection pattern

April 25, 14:30 (CAMPUS)

Process injections are popular techniques for executing malicious payloads without the knowledge of users or defense tools. However, EDR solutions have had a major impact on the reliability of these techniques.

The aim of this talk is to present a way out of the standard patterns of process injection by mixing several techniques such as Module Stomping, threadless injection to eliminate the use of certain Windows APIs and the use of HWBP to bypass EDR hooks.

All along the talk, some dive in the Windows internals and the impact of the different techniques on EDR alerts will be seen to understand the pros and cons of each technique.

Speaker

Yoann Dequeker

Yoann DEQUEKER (@OtterHacker) is a security consultant at Wavestone OSCP and CRTO certified.

While he mainly performs RedTeam operation on large-scale companies, he spends time developing custom C2 and malware to ease engagement and deployment of C2 beacon on secured environment.

In 2023, he presented most of his research to public conferences and workshop such as LeHack in Paris or Defcon31 in Las Vegas.

Organized by

Sponsors

Technology partners

Partner events

Scroll to Top