Search Evasion Techniques

Names, Techniques, Definitions, Keywords

Search Result

1 item(s) found so far for this keyword.

Propagate Process Manipulating

This technique also abuses internal Windows functionality. In this case the technique uses Window Subclassing. When an application creates a window on the system, some information about this specific window are stored. If the system needs to send a message to this window, it makes use of this specific information to correctly target the message. Subclassing allows the interception of …

Read More