Common Information
Type Value
Value
Code Injection - T1540
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use code injection attacks to implant arbitrary code into the address space of a running application. Code is then executed or interpreted by that application. Adversaries utilizing this technique may exploit capabilities to load code in at runtime through dynamic libraries. With root access, `ptrace` can be used to target specific applications and load shared libraries into its process memory.(Citation: Shunix Code Injection Mar 2016)(Citation: Fadeev Code Injection Aug 2018) By injecting code, an adversary may be able to gain access to higher permissions held by the targeted application by executing as the targeted application. In addition, the adversary may be able to evade detection or enable persistent access to a system under the guise of the application’s process.(Citation: Google Triada June 2019)
Details Published Attributes CTI Title
Details Website 2024-11-06 5 Shellcode RE
Details Website 2024-11-06 0 Thick Client Pentesting: Breaking Down the Big Boned Apps — Part:1
Details Website 2024-11-05 0 Malware Development Part 11: APC Injection Technique
Details Website 2024-11-04 1004 US-CERT Vulnerability Summary for the Week of October 28, 2024 - RedPacket Security
Details Website 2024-11-04 10 Windows Malware Development
Details Website 2024-11-04 5 Pwn3D: Abusing 3D Models for Code Execution 
Details Website 2024-11-03 0 How Cyber Criminals Are Evading Antivirus Software
Details Website 2024-11-02 0 Hiding in Plain Sight — The Role of White Hat Hackers in Open Source Security
Details Website 2024-11-01 2 The importance of considering ISO/IEC 27034 in a Secure SDLC
Details Website 2024-11-01 3 Metasploit Weekly Wrap-up 11/01/2024 | Rapid7 Blog
Details Website 2024-11-01 1 LottieFiles Supply Chain Attack: Compromised npm Package Targets Cryptocurrency Wallets - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-01 2 LottieFiles Supply Chain Attack: Compromised npm Package Targets Cryptocurrency Wallets
Details Website 2024-10-31 4 Wordfence Intelligence Weekly WordPress Vulnerability Report (October 21, 2024 to October 27, 2024)
Details Website 2024-10-30 1 JavaScript Security Vulnerabilities Unveiled: Insights from Sandworm Monitor
Details Website 2024-10-30 12 “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack
Details Website 2024-10-28 1185 US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security
Details Website 2024-10-28 26 The SOS Intelligence CVE Chatter Weekly Top Ten - 28 October 2024 - SOS Intelligence
Details Website 2024-10-26 18 AIO Web App Pentesting Checklist
Details Website 2024-10-24 2 Wordfence Intelligence Weekly WordPress Vulnerability Report (October 14, 2024 to October 20, 2024)
Details Website 2024-10-24 3 Angr CTF: Overcoming the “Not Enough Data for Store” Error
Details Website 2024-10-24 1 CVE Alert: CVE-2024-48964 - RedPacket Security
Details Website 2024-10-24 1 CVE Alert: CVE-2024-48963 - RedPacket Security
Details Website 2024-10-24 12 Understanding the Initial Stages of Web Shell and VPN Threats An MXDR Analysis
Details Website 2024-10-23 1 CISA Adds Critical Microsoft SharePoint Vulnerability (CVE-2024-38094) to Known Exploited Vulnerabilities Catalog
Details Website 2024-10-23 1 CISA Warns About New Microsoft SharePoint Vulnerability CVE-2024-38094