Exploit Development Flashcards

1
Q

Loader

A

Short-lived bootstrapper that decrypts and executes shellcode in memory. Avoids persistence and focuses on stealth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implant

A

Long-lived payload handling C2 communication, privilege escalation, and data exfiltration. Operates post-loader execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why use C with /MT, /O2, /Os for loaders?

A

C minimizes binary size; /MT (static linking), /O2 (speed optimization), /Os (size optimization) reduce footprint (~16 KB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4 in loaders

A

Lightweight symmetric encryption (~30 LOC) using syscalls instead of WinCrypt imports to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Partial encryption

A

Encrypts only shellcode, keys, and API hashes to avoid high entropy. Plaintext PE sections blend with benign files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

API hashing

A

Replaces API names with hashes to evade static string analysis (e.g., avoids “VirtualAlloc” in IAT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Indirect syscalls

A

Directly invokes ntdll syscalls (e.g., NtAllocateVirtualMemory) to bypass EDR user-mode hooks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero-touch to disk

A

Executes payload entirely in memory or fetches encrypted payloads over HTTPS to avoid disk writes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

C2 resilience features

A

Sleep-jitter, domain fronting, and DGA fallback to evade network detection and ensure beacon persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Staged payload advantage

A

Minimal initial footprint (e.g., VBA macro) downloads larger stages; allows post-deployment capability updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Staged payload disadvantage

A

Additional network activity increases exposure; reliant on outbound connectivity for staging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stageless payload advantage

A

Single binary with all capabilities; fewer C2 handshakes, suitable for restricted networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stageless payload disadvantage

A

Larger size increases entropy and detection risk; harder to embed in macros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IAT minimization

A

Manual implementation of crypto/syscalls to avoid suspicious imports (e.g., WinCrypt) in the Import Address Table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PE timestamp spoofing

A

Sets compile timestamp to match system DLLs (e.g., ntdll.dll) to avoid anomalous timestamp detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

C2 (Command and Control)

A

Infrastructure used by attackers to remotely control compromised systems.

17
Q

EDR (Endpoint Detection and Response)

A

Security tools monitoring endpoints for malicious activity (e.g., behavioral analysis, API hooks).

18
Q

AMSI (Antimalware Scan Interface)

A

Windows API allowing real-time script scanning (e.g., PowerShell) by antivirus software.

19
Q

DGA (Domain Generation Algorithm)

A

Generates random domain names for C2 fallback, complicating blocklisting.

20
Q

Sleep-jitter

A

Randomizes beacon intervals to avoid predictable timing patterns.

21
Q

Thread Hijacking

A

Process injection technique: hijacks a thread in a benign process to execute shellcode.

22
Q

PPID Spoofing

A

Spoofs the parent process ID to evade detection of suspicious process lineage.

23
Q

Process Hollowing

A

Replaces legitimate process memory with malicious code while retaining its appearance.

24
Q

Entropy

A

Measure of randomness; high entropy (e.g., encrypted data) triggers AV heuristics.

25
IAT (Import Address Table)
PE structure listing external functions a binary imports; often analyzed for suspicious APIs.
26
CRT (C Runtime Library)
Standard library for C; static linking (/MT) includes only necessary functions to reduce size.
27
Domain Fronting
Masks C2 traffic by routing through legitimate domains (e.g., CDNs) to evade filtering.
28
Beacon
Regular C2 check-ins from an implant to receive commands or updates.
29
Shellcode
Position-independent code executed directly in memory, often for exploitation.
30
Meterpreter
Metasploit’s post-exploitation tool; known for small stagers (e.g., 272 B reverse-shell).