Persistence techniques
by Kxd - Monday January 29, 2024 at 01:15 AM
#1
Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)
Reply
#2
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
Reply
#3
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking
Reply
#4
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous
Reply
#5
(Feb 03, 2024, 07:51 PM)Kxd Wrote:
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous

I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense Big Grin
Reply
#6
I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Reply
#7
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw
Reply
#8
(Feb 03, 2024, 11:17 PM)red_dot Wrote:
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw

Exactly
Reply
#9
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

https://wikileaks.org/ciav7p1/cms/page_14587908.html

u fed bruh?  Handsup
Reply
#10
(Feb 03, 2024, 10:17 PM)red_dot Wrote:
(Feb 03, 2024, 07:51 PM)Kxd Wrote:
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous

I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense Big Grin

Oh yeah, i've heard of dll's that don't exist but programs still try to load them and then if you put a dll with the same name they will load it and all, pretty cool though, thank you!

(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Shit that sounds cool as hell, any tips of where to begin writing my own custom shit? Like to don't need ro rely on already used techniques. Im kinda clueless on where to start doing these type of stuff
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 392 15,683 3 hours ago
Last Post: Obito078
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 427 44,573 11 hours ago
Last Post: Letmein1
  Bypass Cookies Encryption | Working FrancisMDouble 8 1,144 Yesterday, 12:43 AM
Last Post: 0x0xGunger998
  Malware On Steroids 0neSh0t 348 24,546 Yesterday, 12:34 AM
Last Post: 0x0xGunger998
  Malware Development MD MZ E Book Mandala 51 2,139 Yesterday, 12:28 AM
Last Post: 0x0xGunger998

Forum Jump:


 Users browsing this forum: 1 Guest(s)