9/9/2023 0 Comments Bonzify Download LinkMonitors specific registry key for changes Reads information about supported languages Installs hooks/patches the running processĪdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Grants permissions using icacls (DACL modification)Īdversaries may hook into Windows application programming interface (API) functions to collect user credentials. ![]() Modifies the access control lists of files Windows File and Directory Permissions ModificationĪdversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files. ![]() Adversaries may abuse Windows Management Instrumentation (WMI) to achieve execution.Īdversaries may abuse the Windows command shell for execution.Īdversaries may abuse command and script interpreters to execute commands, scripts, or binaries.Īdversaries may perform software packing or virtual machine software protection to conceal their code.Īdversaries may delete files left behind by the actions of their intrusion activity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |