Common Information
Type | Value |
---|---|
Value |
Hooking - T1617 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may utilize hooking to hide the presence of artifacts associated with their behaviors to evade detection. Hooking can be used to modify return values or data structures of system APIs and function calls. This process typically involves using 3rd party root frameworks, such as Xposed or Magisk, with either a system exploit or pre-existing root access. By including custom modules for root frameworks, adversaries can hook system APIs and alter the return value and/or system data structures to alter functionality/visibility of various aspects of the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2754-08-03 | 37 | Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library | ||
Details | Website | 2024-12-29 | 2 | Cobalt Strike DFIR: Listening to the Pipes — Blake's R&D | ||
Details | Website | 2024-11-15 | 38 | BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA | ||
Details | Website | 2024-11-15 | 38 | BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA | ||
Details | Website | 2024-11-15 | 4 | New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant - SOC Prime | ||
Details | Website | 2024-11-14 | 11 | Reversing IL2CPP IOS Unity games | ||
Details | Website | 2024-11-13 | 1 | China's Volt Typhoon botnet has re-emerged | ||
Details | Website | 2024-11-13 | 22 | LAB 11 Practical Malwre Analysis | ||
Details | Website | 2024-11-11 | 69 | BSides CPH 2024 Writeup: DIY Trojan horse or: How to get your malware past EDR | ||
Details | Website | 2024-11-11 | 11 | EDR: Don’t mess with my config | ||
Details | Website | 2024-11-11 | 0 | Indianapolis man snared by child predator tracking group | Archives | #childpredator | #onlinepredator | #sextrafficing | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 11 | Remcos RAT IOCs - Part 23 - SEC-1275-1 | ||
Details | Website | 2024-11-10 | 7 | 每日安全动态推送(24/11/7) | CTF导航 | ||
Details | Website | 2024-11-10 | 6 | Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | CTF导航 | ||
Details | Website | 2024-11-09 | 14 | Building CAPEv2 — Automated Malware Analysis Sandbox — Part 1 | ||
Details | Website | 2024-11-09 | 18 | BugBounty — Mastering the Basics (along with Resources)[Part-3] | ||
Details | Website | 2024-11-08 | 27 | New Campaign Uses Remcos RAT to Exploit Victims | FortiGuard Labs | ||
Details | Website | 2024-11-07 | 0 | Tech Analysis: CrowdStrike's Kernel Access and Security Architecture | ||
Details | Website | 2024-11-07 | 26 | The Windows Restart Manager: How It Works Part 1 | ||
Details | Website | 2024-11-05 | 0 | Unveiling Memory Forensics: Techniques for Detecting Malware and Threats Across Platforms | ||
Details | Website | 2024-11-05 | 9 | Vulnerabilities Weaponizing — Cross-site Scripting (XSS) | ||
Details | Website | 2024-11-05 | 14 | 野蛮fuzz:持久性fuzz | CTF导航 | ||
Details | Website | 2024-11-04 | 0 | CylanceMDR: A White Glove Onboarding Experience | ||
Details | Website | 2024-11-04 | 4 | Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | ||
Details | Website | 2024-11-03 | 0 | How Cyber Criminals Are Evading Antivirus Software |