What is a COM object?| www.gdatasoftware.com
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects. COM is a system within Windows to enable interaction between software components through the operating system.[1] References to various COM objects are stored in the Registry. | attack.mitre.org
COM hijacking presents a unique way to load your rogue DLL into another process. In a post-PowerShell world with increasing optics into in-memory tactics, COM hijacking may provide an alternative t…| Adapt and Attack
Download our buyer’s guide to learn everything you need to know to successfully plan, scope and execute your penetration testing projects.| contact.packetlabs.net