COM Hijacking: persist, look at artifacts and detect
In the article we will consider: ✔️ What is COM ✔️ Anchoring using COM-Hijacking ✔️ Where to look for traces in the system: registry, logs, artifacts ✔️ Detection methods Read more
In the article we will consider: ✔️ What is COM ✔️ Anchoring using COM-Hijacking ✔️ Where to look for traces in the system: registry, logs, artifacts ✔️ Detection methods Read more