No traces, no breakage

No traces, no breakage

In this short article, I will show you the basics of how to make your viruses/ransomware/shellcode invisible... Actually, it's mostly about techniques to understand how you get infected and how great Microsoft features could be used in a malicious manner, if you read this article from the light side of the Force...

This should allow you to think about building the security of your assets starting from the basics.

Powershell cannot natively interact with the win32 APIs, however we can use C# in our Powershell session to import win32 APIs. Thank you .NET...

In the Powershell script below, I execute notepad.exe without any information being written to the hard drive. Everything (writing, execution,...) is done into the memory. Absolutely no trace on disk.

No alt text provided for this image

So why all this stuff?

If it was a virus or a shellcode, we could get caught by antiviruses as Powershell and .NET leave artifacts on the hard drive. So, what I used here to avoid getting caught by antivirus software monitoring the disk is called: reflection (https://docs.microsoft.com/en-us/dotnet/csharp/programming-guide/concepts/reflection).

Regarding the detail of the script, I will let you do your homework. You just have to know that in order to get it work, you have to build everything, play with the memory addresses, allocation, ...

What then?

You could say (and maybe you already guessed it):

ok but my antivirus is able to check the memory.

Yes, it can!

And I would answer:

But I can bypass this sh...

And that's why antiviruses or any other cybersecurity tool needs to be updated.

But more than that, we need to understand that it is important to keep cybersecurity alive. It's not just about tools to deploy and Excel spreadsheets to fill out (by the way you can use this script to open Notepad or any other gentle (ransom) tool you want, via a macro (Excel or Word)).

要查看或添加评论,请登录

Youssef B.的更多文章

  • AMSI GREAT IDEA - BAD CONCEPTION

    AMSI GREAT IDEA - BAD CONCEPTION

    Hello. Everyone knows the AMSI feature implemented since Windows 10 (Microsoft AntiMalware Scan Interface).

    4 条评论
  • For better Droppers

    For better Droppers

    This very short article can lead you to deep knowledge about malware coding and I will start it with a simple question:…

  • "Host" header manipulation leads to possible internal redirect

    "Host" header manipulation leads to possible internal redirect

    Introduction During a BugBounty hunt, I was able to get into the internal subnets of the Customer (a big player in…

  • HOW AN ISOLATED DOM-XSS COULD LEAD TO A FULLY COMPROMISED SYSTEM?

    HOW AN ISOLATED DOM-XSS COULD LEAD TO A FULLY COMPROMISED SYSTEM?

    In this article, I want to show you how a simple and isolated DOM XSS could be dangerous if leveraged to a more…

    2 条评论
  • Pourquoi les Hackers devraient s'unir

    Pourquoi les Hackers devraient s'unir

    Qu'est-ce qui s'passe dans l'espace ? La nouvelle secrétaire de l’U.S.

  • MacronLeaks - EMLeaks

    MacronLeaks - EMLeaks

    #Macronleaks #EMleaks : je ne vais pas vous refaire ici un résumé, que vous avez déjà s?rement lu, à propos des…

  • ENKI - Qui était ce Démiurge ?

    ENKI - Qui était ce Démiurge ?

    Bon nombre d'entre vous me demandent la signification de ENKI. Tout d'abord, sachez que c'est ma passion pour…

    2 条评论

社区洞察

其他会员也浏览了