Posts: 11
Threads: 4
Joined: Jan 2024
Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
Posts: 8
Threads: 2
Joined: Jan 2024
(Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
Posts: 65
Threads: 4
Joined: Dec 2023
(Jan 29, 2024, 09:16 PM)basileusapoleia Wrote: (Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
I would also recommend DDL proxying/hijacking
Posts: 11
Threads: 4
Joined: Jan 2024
(Feb 02, 2024, 04:53 PM)red_dot Wrote: (Jan 29, 2024, 09:16 PM)basileusapoleia Wrote: (Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
I would also recommend DDL proxying/hijacking
DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous
Posts: 65
Threads: 4
Joined: Dec 2023
(Feb 03, 2024, 07:51 PM)Kxd Wrote: (Feb 02, 2024, 04:53 PM)red_dot Wrote: (Jan 29, 2024, 09:16 PM)basileusapoleia Wrote: (Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
I would also recommend DDL proxying/hijacking
DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous
I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense
Posts: 14
Threads: 1
Joined: Dec 2023
I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Posts: 65
Threads: 4
Joined: Dec 2023
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw
Posts: 14
Threads: 1
Joined: Dec 2023
(Feb 03, 2024, 11:17 PM)red_dot Wrote: (Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Nice, i think the only best way to make good malware is to invent as much custom techniques as u can so it's standing out of standard looking mw
Exactly
Posts: 65
Threads: 4
Joined: Dec 2023
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
https://wikileaks.org/ciav7p1/cms/page_14587908.html
u fed bruh?
Posts: 11
Threads: 4
Joined: Jan 2024
Feb 05, 2024, 05:27 PM
(This post was last modified: Feb 05, 2024, 05:29 PM by Kxd.)
(Feb 03, 2024, 10:17 PM)red_dot Wrote: (Feb 03, 2024, 07:51 PM)Kxd Wrote: (Feb 02, 2024, 04:53 PM)red_dot Wrote: (Jan 29, 2024, 09:16 PM)basileusapoleia Wrote: (Jan 29, 2024, 01:15 AM)Kxd Wrote: Personally for you guys, which is the most and least hard persistence technique (talking about implementation) that dont relay on exploits?
(sorry for bad english, lol)
DLL proxying in my opinion, fast reliabe and idk why AV/EDR don't detect this
I would also recommend DDL proxying/hijacking
DLL hijacking is still an option in these days? like, i thought microsoft stopped using relative paths since dll hijacking became famous
I was think more of finding exe that loads dll that doesn't exists in same directory or does not exists at all. For example Opera have dbghelp.dll in it's IAT. Also u can create DLL proxy, rename original DLL, place ur own at its place and redirect all function calls to copied DLL that ur proxy DLL loaded. Hope it makes sense 
Oh yeah, i've heard of dll's that don't exist but programs still try to load them and then if you put a dll with the same name they will load it and all, pretty cool though, thank you!
(Feb 03, 2024, 11:01 PM)Nevertheless Wrote: I used WMI Event Subscription back then
Nowadays I go for obscure shit that there is no chance someone writes a detection rule for.
Shit that sounds cool as hell, any tips of where to begin writing my own custom shit? Like to don't need ro rely on already used techniques. Im kinda clueless on where to start doing these type of stuff
|