Search Evasion Techniques
Names, Techniques, Definitions, Keywords
1 item(s) found so far for this keyword.
This technique also abuses internal Windows functionality. In this case the technique uses Window Subclassing. When an application creates a window on the system, some information about this specific window are stored. If the system needs to send a message to this window, it makes use of this specific information to correctly target the message. Subclassing allows the interception of …