System Binary Proxy Execution: Rundll32

0
Language

Level

Beginner

Access

Paid

Certificate

Paid

In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files using the built-in rundll32.exe. Using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under rundll32.

Add your review

Course Description

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary’s MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

Module 1: Introduction

Module 2: What is Technique T1218.011?

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “System Binary Proxy Execution: Rundll32”

×

    Your Email (required)

    Report this page
    System Binary Proxy Execution: Rundll32
    System Binary Proxy Execution: Rundll32
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.