Menu

geschonneck.com

Private homepage of Alexander Geschonneck (Berlin, Germany).

Facebook Email LinkedIn Instagram Bluesky PGPKeyPGPKey

Secondary Menu

Skip to content
  • Home
  • Über mich
  • Impressum / Datenschutz

Schlagwort: kernel-mode backdoors

More on Windows Local Kernel-mode Backdoor Techniques

Posted onSamstag, 10. November 20071 Comment

On uninformed.org you can find a whitepaper which describes several ways to get your code covertly executed in the Windows kernel. 

CategoriesForensics, Live Response, SecurityTagsdigital forensics, kernel-mode backdoors, malware analysis

© 2003-2021 Alexander Geschonneck.
Feel free to contact me for comments.

The 6th edition of my Book on computer-forensik.org
Cover Computer Forensik

Kategorien

Archive

letzte Beiträge

  • digital-forensics.de
  • Windows Memory Forensics Tools [update]
  • new linux incident response script
  • open forensics jobs
  • ch-ch-ch-changes
  • SYSTEM user with Vista
  • Anonymous Quote
  • Stealing Credit and Debit Card Numbers
  • Could have been worse?
  • Trauerrede für meinen Vater
  • 3rd edition of my book
  • wordpress 2.5
  • computer forensics workshops in Berlin and Frankfurt
  • nice geeky captchas
  • Mein Vater, Erwin Geschonneck ist tot
encryption electronic evidence bluetooth database forensics evidence seizure Alexander Geschonneck AusCERT dfrws default passwords credit card fraud database digital forensics BTCrack computer forensics training disk encryption CV ATM crypto evidence preview CeBIT article Computer Forensik Backup e-Discovery business continuity CERT Erwin Geschonneck f-secure cell phone forensics eventlog forensics anonymizer DFN-CERT disclaimer captchas 31337 computer forensics computer-forensik.org anti phishing BCM Autopsy eBay ENISA Birthday digital investigations computer crime
    © 2003-2025. geschonneck.com. Alle Rechte vorbehalten. Impressum. 126 queries - 0,321 seconds. 7.682.141 Besucher. DNT is OFF. Anmelden
Menu
Scroll Up
  • Home
  • Über mich
  • Impressum / Datenschutz