<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Doppelgänging on fahersto&#39;s blog</title>
    <link>https://blog.lentic.de/tags/doppelg%C3%A4nging/</link>
    <description>Recent content in Doppelgänging on fahersto&#39;s blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&lt;a href=&#34;https://creativecommons.org/licenses/by-nc/4.0/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CC BY-NC 4.0&lt;/a&gt;</copyright>
    <lastBuildDate>Sun, 03 Dec 2023 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.lentic.de/tags/doppelg%C3%A4nging/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Process Doppelgänging - code injection technique</title>
      <link>https://blog.lentic.de/posts/process_doppelganging/</link>
      <pubDate>Sun, 03 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://blog.lentic.de/posts/process_doppelganging/</guid>
      <description>What is Process Doppelgänging? Process Doppelgänging is a code injection technique which allows to load and execute arbitrary code in the context of a benign process without calling Windows API functions commonly invoked to achieve code injection. The technique was published by Tal Liberman and Eugene Kogan at Black Hat Europe 2017. The concept is to abuse NTFS transactions to create a process from a malicious section that is seemingly backed by a benign file.</description>
    </item>
  </channel>
</rss>
