Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making. It can also be used by a malicious program to hide certain aspects of itself. For example, malware might try and install a hook into Windows API functions, which list […]
Author Archive for: Tom Wilson
About Tom Wilson
This author has yet to write their bio.Meanwhile lets just say that we are proud Tom Wilson contributed a whooping 11 entries.
Entries by Tom Wilson
A High Level Overview DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging, or reverse engineer software running on a Windows PC. It is also often used by malware to subvert applications running on target systems, so from a security point of view, it’s useful to […]