Комментарии:
Thank you for the great explaination.
ОтветитьCan you please reupload the link to the injector or upload it to a different service? Thanks!
Ответитьi’m watching this 5 years later but very informational, thanks
ОтветитьCould you please explain how to clean our process from any inject to protect and defend ourselves without re install windows again from beginning?
Ответитьexcellent explanation man . your students are lucky to have you .
ОтветитьLink does now work anymore
ОтветитьPlease share the dll...
ОтветитьSo how to find the image of the reflective dll then? If it’s not linked to a module on disk, where to find it ? Thx for advance
ОтветитьGreat Video. Could you pls reup your driver link? It is dead/
Ответитьsource code??
ОтветитьGreat content
Ответитьgoogle drive link is dead. re-up pls?
Ответитьany chance to update the URL to the bits? Link is broken.
ОтветитьWonderful! thanks for the video tutorial
ОтветитьGreat Video! Two questions: Can you recommend a course or resource that teaches how to identify these types of methodologies used by APTs, and; how would a defender go about detecting this in their environment (assuming an attacker has already gained a foothold)?
ОтветитьExcellent video. Informed, to the point, absence of rambling. I appreciate that you explained it, showed it, and framed it in the context of why it is used. Gave a nice complete picture.
ОтветитьYour channel is great! Quality videos.
Ответитьthanks for the video man!
google drive link is broken tho