Intro to Syscalls for Windows Malware

  Рет қаралды 17,011

Prelude

Prelude

Күн бұрын

Пікірлер: 23
@Red4mber
@Red4mber 8 ай бұрын
Damn, that's by far the best explanation i've seen on the subject
@danyalahmad9288
@danyalahmad9288 3 ай бұрын
I was litterally lloking for syscall viedo on yt, but never found something i clearly understood, yt random recomended this viedo, and this is exactly what i need, excelent explanation really loved it, This chanel is worth subscribing
@alienJIZ1990
@alienJIZ1990 8 ай бұрын
Wow, excellent presentation! This topic/attack vector is not nearly covered enough. The space needs more people who understand this and you explained it extremely well
@eversinc33
@eversinc33 Жыл бұрын
I just wanna provide some additional info that I missed to give in the talk, but I feel that should be addressed: 1) The Nt* and Zw* functions, which I call syscalls here, are technically just stdcall wrappers around the actual syscall instruction. The terminology is confusing and many people refer to them as syscalls, but technically they are just wrappers that enable the syscalls to easily be called from C/C++. 2) When I refer to the usage of GetModuleHandle and GetProcAddress with Nt*/Zw* functions as being suspicious, that is also only partly true. Many legitimate programs, including standard windows binaries, use these calls with Nt*/Zw* functions. What might be suspicious here is the type of APIs you are importing, e.g. if those are known to be used for code injection, not the usage of GetProcAddress/GetModuleHandle itself.
@Preludeorg
@Preludeorg Жыл бұрын
🖤
@joyemoticon
@joyemoticon Жыл бұрын
Wow! I could not have asked for a better topic. Exactly what I was wanting to learn!
@Preludeorg
@Preludeorg Жыл бұрын
Glad to hear this. Huge thanks to eversinc33
@CyberCelt.
@CyberCelt. Жыл бұрын
This is a fantastic intro, thanks a lot
@Preludeorg
@Preludeorg Жыл бұрын
Glad you enjoyed - all the credit to eversinc33!
@halfbelf5923
@halfbelf5923 Жыл бұрын
Thank you for explaination. It was useful for me :) I'm coding on c# maybe 2-3 years and I decide to learn something new about malware etc. but only in this guide I found useful techniques.
@rnrbeast
@rnrbeast Жыл бұрын
Very good explanations, thanks for sharing this
@lovedoraemon2390
@lovedoraemon2390 11 ай бұрын
thanks, this is very clear to understand.
@user-ye7nd3oh4p
@user-ye7nd3oh4p 2 ай бұрын
niceee
@detective5253
@detective5253 Жыл бұрын
great slide explaination out there. could you please focus more on the practical side? it's gonna be interesting if you dive deep into red team simulation tactics and malware development using C++ and C# for dealing with system calls if possible.
@Preludeorg
@Preludeorg Жыл бұрын
Thanks for the encouraging words. We'll keep this in mind!
@yurim9917
@yurim9917 Жыл бұрын
👏👏👏
@cvport8155
@cvport8155 Жыл бұрын
Please make more vd for advanced techniques red team and pivoting and dev malware bypass EDR
@Preludeorg
@Preludeorg Жыл бұрын
We'll keep this in mind for future content! Thanks for watching.
@fakeacount1479
@fakeacount1479 Жыл бұрын
hey prelude, can you make video about making your own malware in c++ and testing it in virus total to get 0 detections😮😊
@Preludeorg
@Preludeorg Жыл бұрын
Hey fake acount1 - we'll consider the request 😏
@fakeacount1479
@fakeacount1479 Жыл бұрын
@@Preludeorg ok.
@martinstu8400
@martinstu8400 3 ай бұрын
the fact that any of this is possible says volumes about how bad design of modern OSes is. Both linux and windows are historical mistakes, evolving responsively to environment, without any intellectual guidance. There has to be a complete overhaul, a completely new OS: well documented, hackless, maintained by actually smart people.
@fordprefect8235
@fordprefect8235 2 ай бұрын
very bad take. if the os can do it, a user can do it. thats not changeable if you want a usable os. the only difference between "malware" and "goodware" is the intent.
Offensive Wasm
1:06:56
Prelude
Рет қаралды 2 М.
Malware Development: System Calls
44:49
crow
Рет қаралды 47 М.
А я думаю что за звук такой знакомый? 😂😂😂
00:15
Денис Кукояка
Рет қаралды 4,9 МЛН
The IMPOSSIBLE Puzzle..
00:55
Stokes Twins
Рет қаралды 187 МЛН
Smart Sigma Kid #funny #sigma
00:33
CRAZY GREAPA
Рет қаралды 17 МЛН
what happens when your CPU has a bug? (GhostWrite)
9:58
LaurieWired
Рет қаралды 46 М.
Direct System Calls For Hackers (EDR Evasion)
14:20
Incodenito
Рет қаралды 1,3 М.
Malware Development: Native API
45:01
crow
Рет қаралды 45 М.
how is this hacking tool legal?
11:42
Low Level
Рет қаралды 411 М.
MalDev and Syscalls and BOFs, Oh My!
31:02
SANS Offensive Operations
Рет қаралды 5 М.
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 721 М.
How to write your first malware as a beginner
19:34
screeck
Рет қаралды 20 М.
Linux Kernel 6.12 | This is Historic
1:07:22
Maple Circuit
Рет қаралды 89 М.
#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl
1:02:01
Hack In The Box Security Conference
Рет қаралды 15 М.