Skip to content

This is a repository that is meant to hold detections for various process injection techniques.

Notifications You must be signed in to change notification settings

jsecurity101/Detecting-Process-Injection-Techniques

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

62 Commits
 
 
 
 

Repository files navigation

Detecting Process Injection Techniques:

This is a repository that is meant to hold detections for various process injection techniques.

General Information:

  • Data analytics written within Jupyter Notebooks can be found within the Detection_Notebooks folder.

  • Datasets of each technique can be found within the respective folders.

Technqiues Covered Within This Project:

  • DLL Injection (CreateRemoteThread & RtlCreateUserThread)
  • Reflective DLL Injection
  • Process Hollowing
  • Process Reimaging (not necessarily injection, but still useful)
  • Hook Injection via SetWindowsHookEx

Resources:

POC's:

Reading From The Datasets:

  • You can read from the json file directly from within the notebooks (see Raw notebooks for an example).

  • You can ingest the datasets into your ELK stack by utilziing kafkacat. Follow these steps:

    • Untar the dataset of choice:

      tar -xzvf dataset.tar.gz
      
    • Use kafkacat to send dataset to Kafka broker:

       kafkacat -b <HELK IP>:9092 -t winlogbeat -P -l dataset.json
      

Injection Information:

Authors:

About

This is a repository that is meant to hold detections for various process injection techniques.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published