<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>HBCIA on fahersto&#39;s blog</title>
    <link>https://blog.lentic.de/tags/hbcia/</link>
    <description>Recent content in HBCIA on fahersto&#39;s blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&lt;a href=&#34;https://creativecommons.org/licenses/by-nc/4.0/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CC BY-NC 4.0&lt;/a&gt;</copyright>
    <lastBuildDate>Sun, 03 Dec 2023 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.lentic.de/tags/hbcia/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Process Doppelgänging - code injection technique</title>
      <link>https://blog.lentic.de/posts/process_doppelganging/</link>
      <pubDate>Sun, 03 Dec 2023 00:00:00 +0000</pubDate>
      <guid>https://blog.lentic.de/posts/process_doppelganging/</guid>
      <description>What is Process Doppelgänging? Process Doppelgänging is a code injection technique which allows to load and execute arbitrary code in the context of a benign process without calling Windows API functions commonly invoked to achieve code injection. The technique was published by Tal Liberman and Eugene Kogan at Black Hat Europe 2017. The concept is to abuse NTFS transactions to create a process from a malicious section that is seemingly backed by a benign file.</description>
    </item>
    <item>
      <title>GhostWriting - advanced code injection technique</title>
      <link>https://blog.lentic.de/posts/ghostwriting/</link>
      <pubDate>Sat, 19 Mar 2022 00:00:00 +0000</pubDate>
      <guid>https://blog.lentic.de/posts/ghostwriting/</guid>
      <description>I recently had the chance to study several code injection techniques in-depth. Specifically Host-Based Code Injection Attacks (HBCIAs). This term was introduced to distinguish code injection attacks that target the local system from ones that target remote systems such as SQL injection. I have implemented 22 HBCIA techniques over the last couple of months and the GhostWriting technique stood out to me in particular.&#xA;What is GhostWriting? GhostWriting is an advanced code injection technique that combines thread hijacking, a write-gadget to write to an arbitrary memory location and an endless loop to stall execution.</description>
    </item>
  </channel>
</rss>
