Process Code Injection - Detection, Response, and Mitigation

  • Wednesday, 17 Jul 2024 11:00AM AEST (17 Jul 2024 01:00 UTC)
  • Speaker: Seth Enoka

Process code injection remains a common threat, exploiting modern memory architecture to execute malicious code within the address space of legitimate processes. Delve into process code injection and gain a comprehensive understanding of various techniques employed by adversaries, such as Windows API-based injection, reflective code injection, process hollowing, and process doppelgänging.

This webcast will start with a brief discussion of the foundational aspects of modern memory architecture, necessary for understanding the mechanisms and impacts of process injection. The session will then dive into each injection technique, detailing how adversaries leverage these methods to bypass security measures and gain unauthorized control over system processes.

Moving from theory to practice, we'll explore detection strategies, highlighting tools and techniques that can identify anomalous behavior indicative of process injection. In response to detected threats, we outline effective response protocols that minimize damage and preserve system integrity.

Finally, we address mitigation techniques to level-up defenses against these types of attacks.

By the end of this webinar, attendees will gain actionable insights and practical knowledge to enhance their cybersecurity posture, effectively detecting, responding to, and mitigating process code injection threats in Windows environments.