Room progress ( 0% )
Task 1Introduction
Task includes a deployable machine
Task 2Abusing Processes
Task 3Expanding Process Abuse
Task 4Abusing Process Components
Task 5Abusing DLLs
Task 6Memory Execution Alternatives
Task 7Case Study in Browser Injection and Hooking
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Abusing Windows Internals room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in