The Red Team Vade Mecum
search
⌘Ctrlk
The Red Team Vade Mecum
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
      • Binary Properties and Code Signing
      • ATA/ATP
      • Tips and Tricks
      • Basics
      • Disabling/Patching Telemetry
      • Minimization
      • Misdirection
        • Command Line Argument Spoofing
        • PPID Spoofing via CreateProcess
        • Switching Parents
      • Hiding our Payloads
      • IPC For Evasion and Control
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
    • Lateral Movement
    • Code Injection
    • Persistence
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Defense Evasion

Misdirection

Command Line Argument Spoofingchevron-rightPPID Spoofing via CreateProcesschevron-rightSwitching Parentschevron-right
PreviousDLL Hollowingchevron-leftNextCommand Line Argument Spoofingchevron-right

Last updated 4 years ago