From bfa4d6b45c1c13571396f8c7058171cc9ced5039 Mon Sep 17 00:00:00 2001 From: ae Date: Mon, 17 Feb 2025 21:01:09 +0200 Subject: [PATCH] update srdi post preface snippet --- content/posts/understanding-srdi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/understanding-srdi.md b/content/posts/understanding-srdi.md index 8efa380..aafc284 100644 --- a/content/posts/understanding-srdi.md +++ b/content/posts/understanding-srdi.md @@ -7,7 +7,7 @@ tags = ['windows', 'srdi'] categories = ['malware'] +++ -In the ever-evolving landscape of malware, Shellcode Reflective DLL Injection (RDI) still stands as a formidable technique despite its age. What differentiates it from traditional DLL injection methods is that it doesn't leave apparent traces to the targeted filesystem, which is why it has a chance to bypass basic defensive solutions relying on behavior monitoring, heuristics, or signature-based detection. +Shellcode reflective DLL injection (sRDI) still stands as a relatively stealthy technique in the Windows malware scene despite its age. What differentiates it from simpler DLL injection methods is that it doesn't leave apparent traces to the targeted system's disk, which is why it has a chance to bypass basic defensive solutions relying on e.g. signature detection. ## Steps