about-me variable
Axon Technologies invites you to their event

NCL 13: In-Memory Code Injection: Attacks and Detection

About this event

Navigating the Cyber Land series is coming up on Wednesday, December 15 at 4:00 pm GST, with a new episode "In-Memory Code Injection: Attacks and Detection".

In this webinar, we will discuss certain ways attackers hide their malicious code. Instead of running the malicious code as a separate process - that can be detected using process analysis, the attackers inject that code into a legitimate process that is already running. It becomes harder now to find a suspicious process; in addition, this enables attackers to run their code using the privileges of the injected process.

There are many techniques for code injection. MITRE ATT&CK framework lists around 11 such techniques. However, in this webinar, we will cover the most popular ones such as DLL Injection and PE Injection. We will also talk about the conceptual background of some other techniques, such as:

  • Thread Execution Hijacking
  • Asynchronous Procedure Call
  • Ptrace System Calls
  • Proc Memory
  • Process Hallowing

The second part of the webinar will be about detecting memory code injection. There are various principles and methods that help spot DLL injections as well as PE injections. We will be demonstrating those detection methods using a tool such as Volatility.

At the end of the webinar, there will be a 10-minute live online quiz. Those who get a score of 60% will receive a Certificate of Attendance signed by the presenter and the CEO of Axon Technologies.

Do not wait and reserve your spot now!

Hosted by

  • Team member
    Abed Samhuri Cyber Institute Lead @ Axon Technologies

  • Team member
    FM T
    Fran Martin Marketing Manager @ Axon Technologies

Axon Technologies

Your Cybersecurity Partner

Axon Technologies is a cybersecurity services company focused on protecting organizations of various sizes in this digitally connected world. Our mission is to help organizations predict, prevent, detect, respond to, and recover from cyber-attacks.