Тёмный

Injecting DLL with Shellcode 

Pavel Yosifovich
Подписаться 2,5 тыс.
Просмотров 3,5 тыс.
50% 1

Опубликовано:

 

7 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 22   
@ek2719
@ek2719 8 месяцев назад
Great video Pavel. Brilliant step by step explanation as with all your videos. Thank you for the content.
@micronn
@micronn 8 месяцев назад
Nice explanation. The Quick Assembler tool looks great too. By the way, this shellcode does not seem to make sure that the stack is properly aligned.
@zodiacon
@zodiacon 8 месяцев назад
You're partially right about the alignment - there is a single push, so it's aligned. I could have added support for alignment guarantee, but wanted to keep things simple.
@andrey344
@andrey344 8 месяцев назад
What a helpful channel
@amirmahdavi8005
@amirmahdavi8005 4 месяца назад
Thanks.
@Hallilo
@Hallilo 8 месяцев назад
Hi Pavel, i would love if you could make some videos about kernel mode programming like drivers with the windows driver kit :) or other low level windows programming concepts / tutorials
@zodiacon
@zodiacon 8 месяцев назад
training.trainsec.net/windows-kernel-programming-1
@dadogwitdabignose
@dadogwitdabignose 7 месяцев назад
you're a life saver man thank you so much
@EnLopXf
@EnLopXf 7 месяцев назад
I hope you create another great videos
@zodiacon
@zodiacon 7 месяцев назад
Expect a new video tomorrow!
@stephencole9289
@stephencole9289 8 месяцев назад
Setting the memory as executable later (and as read,executable) (ie not at the same time as setting it RW) to try to avoid things noticing, was clever. Worth noting you have to be admin (or have debug privileges?) to do this injection etc
@zodiacon
@zodiacon 8 месяцев назад
No need for admin rights or debug privilege. It depends on your target process.
@stephencole9289
@stephencole9289 8 месяцев назад
Ah yes, if the target process was started by (running in the context of) the current user doing the injecting, then its ok. Which is also why a normal user can debugg their own running apps. The comment was more to highlight the fact that cant inject into system processes etc without the necessary rights.
@stephencole9289
@stephencole9289 8 месяцев назад
At 19:00 the ASLR address of loadlibrary in the target process is USALLY the same as in the program doing the injecting, ie common for the state of the system since the last reboot, but not guaranteed for certain dll's?
@zodiacon
@zodiacon 8 месяцев назад
Guaranteed
@cra0kalo
@cra0kalo 8 месяцев назад
When will you release your Tool Quick Assembler?
@zodiacon
@zodiacon 8 месяцев назад
Probably at the end of the month, when the "x64 Architecture and Programming" live training course would have been completed.
@cra0kalo
@cra0kalo 8 месяцев назад
That would be awesome. Love your work!@@zodiacon
@stephencole9289
@stephencole9289 8 месяцев назад
Using 1
@zodiacon
@zodiacon 8 месяцев назад
Not sure why it's funny :) it's easier especially for larger values.
@stephencole9289
@stephencole9289 8 месяцев назад
Amusing would be a better comment (I would have just bunged in 4096)
Далее
Darkside Clone Demo from the webinar
1:22:48
Просмотров 1 тыс.
Drivers And Devices (Part 2)
20:05
Просмотров 434
Мама знает где все документы
00:21
Fixing Plastic with Staples
00:18
Просмотров 1,4 млн
The Importance of Error Handling in C
8:18
Просмотров 30 тыс.
Introduction to ETW
23:11
Просмотров 1,9 тыс.
Native Applications: What, Why, and How?
1:01:40
Просмотров 6 тыс.
Developing Trojans With Shellcode
32:23
Просмотров 25 тыс.
DLL Hijacking in Rust, Pt. 1
37:25
Просмотров 4,4 тыс.
Should you be a Software Engineer in 2024
8:12
Просмотров 11 тыс.