January 2020
Intermediate to advanced
368 pages
9h 46m
English

There are countless ways of developing Microsoft Windows attacks—too many to cover in this chapter. Instead of discussing them all, we’ll introduce and investigate a few techniques that can help you attack Windows, whether initially or during your post-exploitation adventures.
After discussing the Microsoft API documentation and some safety concerns, we’ll cover three topics. First, we’ll use Go’s core syscall package to interact with various system-level Windows APIs by performing a process injection. Second, we’ll explore Go’s core package for the Windows Portable Executable (PE) format and write a PE ...