Local Function Stomping Injection
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/Local Function Stomping Injection.md.
Status: catalogued
Excerpt
Module 44 - Local Function Stomping Injection The previously demonstrated mapping injection modules were used to avoid the usage of
VirtualAlloc/ExWinAPI calls. This module will demonstrate another method that avoids the usage of these WinAPIs. The term “stomping” refers to the act of overwriting or replacing the memory of a function or other data structure in a program with different data. Fun…
Likely wiki targets
Pending — this source has not yet been distilled into wiki pages. Future ingest can populate links to the concept / technique / CVE pages this material would inform.
