Persistence techniques
by Kxd - Monday January 29, 2024 at 01:15 AM
#1
Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)
Reply
#2
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
Reply
#3
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking
Reply
#4
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous
Reply
#5
(Feb 03, 2024, 07:51 PM)Kxd Wrote:
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous

I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense Big Grin
Reply
#6
I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Reply
#7
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw
Reply
#8
(Feb 03, 2024, 11:17 PM)red_dot Wrote:
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw

Exactly
Reply
#9
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

https://wikileaks.org/ciav7p1/cms/page_14587908.html

u fed bruh?  Handsup
Reply
#10
(Feb 03, 2024, 10:17 PM)red_dot Wrote:
(Feb 03, 2024, 07:51 PM)Kxd Wrote:
(Feb 02, 2024, 04:53 PM)red_dot Wrote:
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote:
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?


(sorry for bad english, lol)

DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this

I would also recommend DDL proxying/hijacking

DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous

I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense Big Grin

Oh yeah, i've heard of dll's that don't exist but programs still try to load them and then if you put a dll with the same name they will load it and all, pretty cool though, thank you!

(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.

Shit that sounds cool as hell, any tips of where to begin writing my own custom shit? Like to don't need ro rely on already used techniques. Im kinda clueless on where to start doing these type of stuff
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 425 43,469 3 hours ago
Last Post: xdlol199485
  [Go] Using the recycle bin for stealthy persistence (Beginner tutorial) CreateThread 17 1,036 Yesterday, 11:13 PM
Last Post: learn1
  [Sektor7] Full Recent Course Spearr 31 820 Yesterday, 11:11 PM
Last Post: learn1
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 388 15,207 Yesterday, 10:49 PM
Last Post: learn1
  Xordium stealer for Pulsar v2.4.5 nullvex 26 1,082 Yesterday, 08:14 PM
Last Post: Misanotnessa

Forum Jump:


 Users browsing this forum: 1 Guest(s)