How would you prefer to name macros that generate syscalls in assembly?
How would you prefer to name macros that generate syscalls in assembly?
→ #Speedrunners are #vulnerability researchers, they just don't know it yet
https://zetier.com/speedrunners-are-vulnerability-researchers/
“Super Mario World runners will place items in extremely precise locations so that the X,Y coordinates form #shellcode they can jump to with a dangling reference. Legend of #Zelda: Ocarina of Time players will do heap grooming and write a #function pointer […] so the game “wrong warps” directly to the #end #credit sequence… with nothing more than a #game #controller and a steady #hand”
Decai decompiling a malicious shellcode.
The instructions are not so readable, if you're not used to syscalls int 0x80. AI does it for you.
What are people using as a syscall database?
Analysis of malicious HWP cases of 'APT37' group distributed through K messenger
The report details a sophisticated APT attack targeting South Korea, utilizing spear-phishing techniques and malicious HWP files distributed through a popular Korean messenger service. The APT37 group exploited trust-based tactics, using compromised accounts to spread malware through group chats. The malicious files contained OLE objects that executed PowerShell commands and shellcode, ultimately deploying the RoKRAT malware. This file-less attack method allowed for information gathering and potential remote control of infected systems. The attackers used pCloud for data exfiltration and command-and-control communication. The report emphasizes the importance of endpoint detection and response (EDR) systems to combat such evolving threats.
Pulse ID: 67a38d686710526e35f1ff4d
Pulse Link: https://otx.alienvault.com/pulse/67a38d686710526e35f1ff4d
Pulse Author: AlienVault
Created: 2025-02-05 16:10:16
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
AsyncRAT Reloaded: Using Python and TryCloudflare for Malware Delivery Again
A new AsyncRAT malware campaign has been identified, utilizing malicious payloads delivered through TryCloudflare quick tunnels and Python packages. The attack chain begins with a phishing email containing a Dropbox URL, leading to a ZIP file with an internet shortcut. This triggers a series of downloads, ultimately executing AsyncRAT malware via Python scripts. The campaign employs legitimate infrastructure like Dropbox and TryCloudflare to evade detection. It uses a multi-step process involving LNK, JavaScript, and BAT files, culminating in the extraction of malicious Python scripts. The attackers use process injection techniques to inject shellcode into legitimate processes like notepad.exe and explorer.exe. This sophisticated approach highlights the evolving nature of cyber threats and the exploitation of legitimate services for malicious purposes.
Pulse ID: 679dd8f83b0571424707dbf6
Pulse Link: https://otx.alienvault.com/pulse/679dd8f83b0571424707dbf6
Pulse Author: AlienVault
Created: 2025-02-01 08:19:04
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Shellcode over MIDI? Bad Apple on a PSR-E433, Kinda - If hacking on consumer hardware is about figuring out what it can do, and pushing ... - https://hackaday.com/2025/01/23/shellcode-over-midi-bad-apple-on-a-psr-e433-kinda/ #reverseengineering #musicalhacks #shellcode #badapple #yamaha #video #midi
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
Is there an example of shellcode or other malware needing to use Floating Point assembly instructions?
From C to shellcode (simple way)
This post explains the journey of turning C code into shellcode, including techniques to create compact and executable shellcode suitable for exploitation.
Roughly two years ago I hacked together a small tool to automatically download the
#windows #docker images, extract the ntdll.dll from them and extract the #syscall numbers for that Windows version. This can be used for #shellcode and other #malware dev activities.
I've finally pushed the code to GitHub and redeployed the website.
All the data is either available in the HTML tables, or as a JSON by appending ?format=json
to the URL.
Because it's just been redeployed, it's re-downloading all the images, so it will take a few hours until more Windows versions are indexed. It's now indexed more than 200 different version of ntdll.dll :)
You've probably heard of the xz-utils
backdoor by now. You shouldn't submit backdoors to Open Source projects... unless it's to ronin-payloads! We're always looking for more payloads!
#opensource #ruby #payloads #shellcode #webshells #hacking #corny #shamelesspromotion
ChaiLdr: un caricatore di shellcode che sfida gli antivirus
#ChaiLdr è un #progetto #opensource che mira a creare un #loader di #shellcode che possa evitare il rilevamento da parte dei #software #antivirus (#AV) e dei #sistemi di rilevamento e risposta agli endpoint (#EDR).
#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
https://www.redhotcyber.com/post/chaildr-un-caricatore-di-shellcode-che-sfida-gli-antivirus/
StopCrypt: il ransomware per i comuni mortali difficile da rilevare ma altamente virale
I #ricercatori di #sicurezza hanno scoperto una nuova variante del #ransomware chiamata #StopCrypt, noto anche come #STOP. Questa versione utilizza un processo di esecuzione #shellcode per aggirare gli strumenti di sicurezza, rendendo il #malware particolarmente pericoloso perché difficile da rilevare.
#redhotcyber #online #it #web #ai #hacking #privacy #cybersecurity #cybercrime #intelligence #intelligenzaartificiale #informationsecurity #ethicalhacking #dataprotection #cybersecurityawareness #cybersecuritytraining #cybersecuritynews #infosecurity
Nice introduction to Position Independent shellcodes (MinGW, GetProcAddress, GetModuleHandle)
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
New cheatsheets pushed
https://github.com/r1cksec/cheatsheets
Including:
A nice writeup about a XSS vulnerability found on chess.com
https://skii.dev/rook-to-xss
This tool can be used as a framework for CI/CD security analysis
https://github.com/CycodeLabs/raven
A great post about Process Injection in the context of Kernel Triggered Memory Scans
https://www.r-tec.net/r-tec-blog-process-injection-avoiding-kernel-triggered-memory-scans.html
Simple Shellcode Runner in Rust Language
https://github.com/CyberSecurityUP/shellcode-runner-rust
Introduction to PIC shellcodes (MinGW, GetProcAddress, GetModuleHandle)
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
Hier hat mal jemand eine schadhafte Excel-Datei auseinandergenommen. Es nutzt eine Schwachstelle im Formeleditor (CVE-2017-11882) aus und lädt schadhafte Inhalte nach.
https://isc.sans.edu/diary/Simple+Shellcode+Dissection/29642