Тёмный

Intro to Syscalls for Windows Malware 

Prelude
Подписаться 3,2 тыс.
Просмотров 16 тыс.
50% 1

This session features eversinc33 giving an intro to syscalls implementations for Windows malware.
This is a recording from the Prelude Discord Live Stream Series.
Click here to join the Prelude Discord: / discord

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 23   
@joyemoticon
@joyemoticon Год назад
Wow! I could not have asked for a better topic. Exactly what I was wanting to learn!
@Preludeorg
@Preludeorg Год назад
Glad to hear this. Huge thanks to eversinc33
@halfbelf5923
@halfbelf5923 Год назад
Thank you for explaination. It was useful for me :) I'm coding on c# maybe 2-3 years and I decide to learn something new about malware etc. but only in this guide I found useful techniques.
@danyalahmad9288
@danyalahmad9288 Месяц назад
I was litterally lloking for syscall viedo on yt, but never found something i clearly understood, yt random recomended this viedo, and this is exactly what i need, excelent explanation really loved it, This chanel is worth subscribing
@detective5253
@detective5253 Год назад
great slide explaination out there. could you please focus more on the practical side? it's gonna be interesting if you dive deep into red team simulation tactics and malware development using C++ and C# for dealing with system calls if possible.
@Preludeorg
@Preludeorg Год назад
Thanks for the encouraging words. We'll keep this in mind!
@lovedoraemon2390
@lovedoraemon2390 9 месяцев назад
thanks, this is very clear to understand.
@cvport8155
@cvport8155 Год назад
Please make more vd for advanced techniques red team and pivoting and dev malware bypass EDR
@Preludeorg
@Preludeorg Год назад
We'll keep this in mind for future content! Thanks for watching.
@martinstu8400
@martinstu8400 Месяц назад
the fact that any of this is possible says volumes about how bad design of modern OSes is. Both linux and windows are historical mistakes, evolving responsively to environment, without any intellectual guidance. There has to be a complete overhaul, a completely new OS: well documented, hackless, maintained by actually smart people.
@fordprefect8235
@fordprefect8235 17 дней назад
very bad take. if the os can do it, a user can do it. thats not changeable if you want a usable os. the only difference between "malware" and "goodware" is the intent.
@Red4mber
@Red4mber 6 месяцев назад
Damn, that's by far the best explanation i've seen on the subject
@user-ye7nd3oh4p
@user-ye7nd3oh4p 8 дней назад
niceee
@eversinc33
@eversinc33 Год назад
I just wanna provide some additional info that I missed to give in the talk, but I feel that should be addressed: 1) The Nt* and Zw* functions, which I call syscalls here, are technically just stdcall wrappers around the actual syscall instruction. The terminology is confusing and many people refer to them as syscalls, but technically they are just wrappers that enable the syscalls to easily be called from C/C++. 2) When I refer to the usage of GetModuleHandle and GetProcAddress with Nt*/Zw* functions as being suspicious, that is also only partly true. Many legitimate programs, including standard windows binaries, use these calls with Nt*/Zw* functions. What might be suspicious here is the type of APIs you are importing, e.g. if those are known to be used for code injection, not the usage of GetProcAddress/GetModuleHandle itself.
@Preludeorg
@Preludeorg Год назад
🖤
@CyberCelt.
@CyberCelt. Год назад
This is a fantastic intro, thanks a lot
@Preludeorg
@Preludeorg Год назад
Glad you enjoyed - all the credit to eversinc33!
@alienJIZ1990
@alienJIZ1990 6 месяцев назад
Wow, excellent presentation! This topic/attack vector is not nearly covered enough. The space needs more people who understand this and you explained it extremely well
@rnrbeast
@rnrbeast Год назад
Very good explanations, thanks for sharing this
@yurim9917
@yurim9917 Год назад
👏👏👏
@fakeacount1479
@fakeacount1479 Год назад
hey prelude, can you make video about making your own malware in c++ and testing it in virus total to get 0 detections😮😊
@Preludeorg
@Preludeorg Год назад
Hey fake acount1 - we'll consider the request 😏
@fakeacount1479
@fakeacount1479 Год назад
@@Preludeorg ok.
Далее
Offensive Wasm
1:06:56
Просмотров 1,9 тыс.
Malware Development: System Calls
44:49
Просмотров 45 тыс.
Офицер, я всё объясню
01:00
Просмотров 3,5 млн
titan tvman's plan (skibidi toilet 77)
01:00
Просмотров 5 млн
These fake Tutorials HACK YOU
16:23
Просмотров 76 тыс.
Best Antivirus/EDR vs Unknown Ransomware
11:38
Просмотров 104 тыс.
FA2023 Week 11: Antivirus and EDR Evasion (2023-11-12)
53:06
Debugging Windows Internals with x64dbg!
1:17:11
Просмотров 2,5 тыс.
Malware Development: Native API
45:01
Просмотров 43 тыс.
MalDev and Syscalls and BOFs, Oh My!
31:02
Просмотров 4,7 тыс.
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 648 тыс.
How many kernel system calls do runtimes make?
19:18
Просмотров 20 тыс.
When you Accidentally Compromise every CPU on Earth
15:59