diff --git a/content/posts/understanding-srdi.md b/content/posts/understanding-srdi.md index 8efa380..aafc284 100644 --- a/content/posts/understanding-srdi.md +++ b/content/posts/understanding-srdi.md @@ -7,7 +7,7 @@ tags = ['windows', 'srdi'] categories = ['malware'] +++ -In the ever-evolving landscape of malware, Shellcode Reflective DLL Injection (RDI) still stands as a formidable technique despite its age. What differentiates it from traditional DLL injection methods is that it doesn't leave apparent traces to the targeted filesystem, which is why it has a chance to bypass basic defensive solutions relying on behavior monitoring, heuristics, or signature-based detection. +Shellcode reflective DLL injection (sRDI) still stands as a relatively stealthy technique in the Windows malware scene despite its age. What differentiates it from simpler DLL injection methods is that it doesn't leave apparent traces to the targeted system's disk, which is why it has a chance to bypass basic defensive solutions relying on e.g. signature detection. ## Steps