- This topic has 5 replies, 3 voices, and was last updated 2 years, 5 months ago by .
- You must be logged in to reply to this topic.
how our backdoors directly installed in the memory. i read this book Penetration Testing – A hands-on introduction to Hacking.
Not all backdoors run from memory, meterpreter payloads for example run from memory.
how i do it
That’s a big topic and it’s hard to explain in one comment please have a look on the following resource as a start and I highly recommend doing more research into this if you’re interested in it
You’re welcome, I’m glad we could help:)
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!