MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions
The Last Watchdog
MARCH 4, 2019
Turns out it was possible for a threat actor to flood GLIBC with data , take control of it, and then use it as a launch point for stealing passwords, spying on users and attempting to usurp control of other computers. This then drops a PowerShell script into the memory of the host computer. This is where PowerShell comes back into play.
Let's personalize your content