Posts: 2,886
Threads: 65
Joined: Jun 2024
What you will learn
- WinAPI function manual location with Assembly
- PEB Structure and PEB_LDR_DATA
- PE File Structure
- Relative Virtual Address calculation
- Export Address Table (EAT)
- Windows x64 calling-convention in practice
- Writing in Assembly like a real Giga-Chad...
Posts: 1,314
Threads: 226
Joined: Jun 2023
Chad contribution for chad leecher.
Posts: 3
Threads: 0
Joined: Mar 2024
(Jul 27, 2024, 05:47 PM)Lokie Wrote: What you will learn
- WinAPI function manual location with Assembly
- PEB Structure and PEB_LDR_DATA
- PE File Structure
- Relative Virtual Address calculation
- Export Address Table (EAT)
- Windows x64 calling-convention in practice
- Writing in Assembly like a real Giga-Chad...
There is a new process injection method that leverages recent Windows APIs like:
GetThreadDescription/SetThreadDescription
and
ZwQueueApcThreadEx2
These API functions which were introduced in Windows 10. This approach benefits from the following:
- Less Detection: By using APIs that are less commonly associated with process injection, such as
SetThreadDescription
, the method evades detection by many antivirus (AV) and endpoint detection and response (EDR) systems.
- Bypassing Access Controls: It performs remote memory allocation and writing using a handle that lacks
PROCESS_VM_WRITE
access, which makes it harder for traditional security measures to detect unauthorized memory manipulation.
Overall, this technique is more stealthy and less likely to be flagged by security solutions compared to older, more established injection methods. This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Ransomware sales/discussion/recruiting | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 2,886
Threads: 65
Joined: Jun 2024
Jul 28, 2024, 04:27 AM
(This post was last modified: Jul 28, 2024, 04:37 AM by Loki.)
(Jul 27, 2024, 06:31 PM)xzin0vich Wrote: Chad contribution for chad leecher.
What?
(Jul 27, 2024, 06:57 PM)thoth Wrote: (Jul 27, 2024, 05:47 PM)Lokie Wrote: What you will learn
- WinAPI function manual location with Assembly
- PEB Structure and PEB_LDR_DATA
- PE File Structure
- Relative Virtual Address calculation
- Export Address Table (EAT)
- Windows x64 calling-convention in practice
- Writing in Assembly like a real Giga-Chad...
There is a new process injection method that leverages recent Windows APIs like:
GetThreadDescription/SetThreadDescription
and
ZwQueueApcThreadEx2
These API functions which were introduced in Windows 10. This approach benefits from the following:
- Less Detection: By using APIs that are less commonly associated with process injection, such as
SetThreadDescription
, the method evades detection by many antivirus (AV) and endpoint detection and response (EDR) systems.
- Bypassing Access Controls: It performs remote memory allocation and writing using a handle that lacks
PROCESS_VM_WRITE
access, which makes it harder for traditional security measures to detect unauthorized memory manipulation.
Overall, this technique is more stealthy and less likely to be flagged by security solutions compared to older, more established injection methods.
While "ZwQueueApcThreadEx2" can be used for executing code via APCs, "GetThreadDescription" and "SetThreadDescription" are not related to code execution or function resolution.
EDIT: I stand corrected by @ Cas and you, https://github.com/hasherezade/thread_namecalling
Posts: 149
Threads: 4
Joined: Sep 2023
Posts: 39
Threads: 0
Joined: Dec 2023
nice, good read This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 103
Threads: 1
Joined: Nov 2023
(Jul 27, 2024, 05:47 PM)Loki Wrote: What you will learn
- WinAPI function manual location with Assembly
- PEB Structure and PEB_LDR_DATA
- PE File Structure
- Relative Virtual Address calculation
- Export Address Table (EAT)
- Windows x64 calling-convention in practice
- Writing in Assembly like a real Giga-Chad...
ok bro,let s check it This forum account is currently banned. Ban Length: Permanent (N/A Remaining) Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Posts: 14
Threads: 0
Joined: Jan 2024
thanks for you share, and i reading it
Posts: 13
Threads: 0
Joined: Mar 2024
Posts: 13
Threads: 0
Joined: Oct 2024
|