OwOwningTheWinAPI

OwOwning with the Windows API

PowerPoint Here

OwOwning with the Windows API is a presentation given during the DEFCON Furs 2020 virtual conference.

During the presentation, I (secfurry) explore the methods and function calls used to spoof parent process relationships in Windows and inject shellcode into Windows applications.
I cover many undocumented or lesser known functions and provide code (saved here) to experiment and modify as you see fit.

I can be reached on Twitter at @secfurry.

PS: The code used in this presentation was given to one of my friends @iDigitalFlame to use in development for his malware framework XMT, go check it out if you’re interested in more cool stuff like this.

Links

Windows API Function Reference

Updated on 08/07/2020

Visit original content creator repository
https://github.com/secfurry/OwOwningTheWinAPI

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *