Are executales based as window service hard to be memory edited?
If an executable is made to run as a window service and someones tries to
edit its memory or inject some code into, this becomes harder?
I mean , since the process is shown only in the services list rather than
the processlist it means that it is harder to hook it and there must be
other methods of editing the memory/hooking the process .
Thanks in advance,
No comments:
Post a Comment