Andrea Fortuna has posted a very useful article about the most common malware persistence techniques. You will learn about the most common registry keys used by malware (very long and nice list), DLL search order hijacking, shortcut hijacking, bootkits and COM hijacking.

Load More Related Articles
Load More In Tips & Tricks

Leave a Reply

Your email address will not be published. Required fields are marked *