Image File Execution Options Injection

I've been reading about https://attack.mitre.org/techniques/T1546/012/

Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application’s IFEO will be prepended to the application’s name, effectively launching the new process under the debugger

e.g.,

C:\dbg\ntsd.exe -g notepad.exe

Few questions:

Can adversaries execute malware undetected using this technique?

e.g.

C:\dbg\ntsd.exe -g malware.exe 

If yes, does that mean that ntsd.exe pose a risk and should be blocked?

I would like to test this, but how do I get ntsd.exe? I don't see this in Ms Windows.

submitted by /u/w0lfcat
[link] [comments]

from hacking: security in practice https://ift.tt/3CPcHEB

Comments