The Key to COMpromise - Pwning AVs and EDRs by Hijacking COM Interfaces, Part 1, 2 and 3:
https://neodyme.io/en/blog/com_hijacking_1/
https://neodyme.io/en/blog/com_hijacking_2/
https://neodyme.io/en/blog/com_hijacking_3/#vulnerability-1-leveraging-file-deletion-for-lpe
#edr #redteam #informationsecurity #edr #com #programming #cybersecurity
https://neodyme.io/en/blog/com_hijacking_1/
https://neodyme.io/en/blog/com_hijacking_2/
https://neodyme.io/en/blog/com_hijacking_3/#vulnerability-1-leveraging-file-deletion-for-lpe
#edr #redteam #informationsecurity #edr #com #programming #cybersecurity
Comments