504.5 Flashcards
Ghost
Modifying the assembly of an executable in order to bypass an EDR systems by inserting junk code. The junk code modifies the program but with no lasting changes to how the program executes.
Defender Check
Takes a malicious file and scans it on a local windows 10 machine with windows Defender. If the file code raises an alert it will split the code into 2 smaller chunks and scan each piece independently while discarding the code that did not trigger the alarm.
Metasm Framework
Tool that uses scripts to disassemble payload raw source code into ASCII assembly source code.
Keyed Payloads
A technique where the payload is encrypted using a key that is taken from an environment variable.
Live of the Land
Instead of adding third party executables, the attacker reuses existing tools to accomplish their goals. Because these existing tools are generally considered non-malicious by the infected OS.
MSBuild
A built-in tool for building and executing C, C++, C# code. An attacker can use MSBuild to run code written in any of these languages by compiling and running a source file.
Hijacking Attack
An adversary responds to system requests for services and pretends to be the legitimate system
Responder
Hijacking tool that impersonates servers and harvest credentials. (works with SMB and other protocols)
UTMP File
Unix file for storing info about all users currently logged into the system.
wmtp file
stores information about all the users who have ever logged on to the machine
btmp file
stores information about bad login attempts. often disabled by sysadmins because a file would be left around containing passwords in clear text if users entered passwords into username field and vice versa.
lastlog file
shows information associated with the most recent login time and date for each user.
Persistence goals
1) Regain Access
2) Avoid Detection
3) Preserve Privileges
4) Flexible in reestablishing access
persistence_service
metasploit module for automating the process of creating a service and automatically running an automatically-generated payload written to a temporary directory
silent exit process
Target process can be launched when another process exits. intended for developers to use to launch a debugger process when a target process terminates (normally or unexpectedly)