EDR: Master Function-Hooking DLLs (Part2)

EDR: Master Function-Hooking DLLs (Part2)

Discover how to leverage Velociraptor and Windows Defender to identify and remediate malicious process activities using Function-Hooking DLLs. Uncover 7 essential checks with corresponding VQL queries and settings to enhance your security posture.


Uncover Hidden Threats with Function-Hooking DLLs: 7 Essential Process Activity Checks.

No alt text provided for this image

Let's discuss important sub topics under function hooking dll's.

  1. Process Activity
  2. Process Creation
  3. Process Termination
  4. Process Access
  5. Image/Library Loaded
  6. Remote Thread Creation
  7. Process Tampering Activity

Get More here

要查看或添加评论,请登录

Cynor Sense的更多文章

社区洞察

其他会员也浏览了