top of page
The Cyber Yeti | Keep Exploring
Home
YouTube
Live Stream Schedule
Community
Discord
Training
Where do I start?
Malware Mondays
Quick Reference
PCAPs
Podcast
Blog
Newsletter
More
Use tab to navigate through the menu items.
All Posts
Malware Analysis
Reverse Engineering
Ethical Hacking
Network Monitoring
Josh Stroschein
Mar 18, 2020
5 min read
Maldoc uses Windows API to perform process hollowing
A favorite technique by malware authors is to use macros in their office documents to utilize a normal system executable and replace the...
bottom of page