Process Injection
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.
Description
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.
Available Mitigations
This technique can be mitigated using 4 documented security measures.
Application Isolation and SandboxingBehavior Prevention on EndpointPrivileged Account ManagementPrivileged Process Integrity
Quick Info
- Technique ID
- T1055
- Tactic
- Priv Esc
- Sub-Techniques
- 12
- Mitigations
- 4
