Evading Defender - Asynchronous Procedure Call (APC) Injection via alertable state
Автор: RBT Security
Загружено: 2025-11-26
Просмотров: 100
Описание:
Join the Discord community to discuss and learn more: / discord
APC Injection via alertable state
In this video, we explain how Asynchronous Procedure Call (APC) injection works and why it often appears in security research. We also highlight related Mythic capabilities, such as AMSI and ETW bypass concepts, default process swapping (e.g., MSBuild.exe as LOLBins), and user-focused system enumeration (Seatbelt) to provide context on how defenders and researchers study post-exploitation techniques. If you’d like to learn more or discuss the research side of these topics, join our community on Discord!
Follow Us:
Discord: / discord
LinkedIn: / rbtsecurity
Twitter: / rbtsecurity
Facebook: / rbtsecur1ty
GitHub: https://github.com/rbtsecurity/
Contact Us:
For business inquiries and collaborations, please email us at [email protected]
Educational Disclaimer:
All content is intended for educational purposes only, to promote ethical hacking and security research.
#CyberSecurity #MalwareAnalysis #APCInjection #WindowsInternals #ReverseEngineering #RedTeam #InfoSec #SecurityResearch #TechEducation #HackingExplained #RBTSecurity
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: