miércoles, 31 de mayo de 2023

ANNOUNCEMENT: Submitters Of Papers And Training For Global AppSec DC 2019 (Formerly AppSec USA)

We had an overwhelming turnout out of submissions for Call for Papers and Call for Training for the OWASP Global AppSec DC 2019 (formerly AppSec USA)  We want to give each submission the time deserved to evaluate each before choosing.  Keeping that in mind the notifications of acceptance and thanks will be CHANGED to July 1, 2019.  We appreciate your understanding and patience in this matter.

Related word


HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL

Kali Linux has been the most advanced penetration testing machine introduced yet. It has the most valuable tools used for every sort of hacking. To take advantage of Kali Linux hacking tools, you have to switch your OS to Kali Linux. You can either install Kali Linux as your default OS or just install as a virtual machine within the same OS. You can learn more about how to install Kali Linux Virtualbox. Today in this tutorial, I am just going to share a very simple Kali Linux tutorial on how to capture screenshot in Kali Linux. It's very simple and newbie friendly.

SO, HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LINUX TUTORIAL

There are two ways to capture a screenshot in Kali Linux. One is the ultimate easy one and the second one is a bit complex but it's also not so complicated. So, don't worry about anything.

INSTRUCTIONS TO FOLLOW

  • In a first way, you can take a screenshot in a similar way as you take in Windows OS by simply clicking the PrntScr button on the keyboard. As you hit that button, a screenshot will be saved in the Pictures folder of your Kali Linux. The major problem with it, it only captures the full screen. We have no control over it to capture a specific window or region.
  • The second way is to take a screenshot using the command. For that, open up a terminal in the Kali Linux and type apt-get install ImageMagick.
  • Once the command is completed and ImageMagick is installed. We have two options to take a screenshot with it. One is to capture full screen and second is to capture a specific window.
  • To capture full screen, type import -window root Pictures/AnyNameOfTheImage.png in the terminal. It will take a full screenshot and will save it to the Pictures directory by the name you specify. Make sure to type .png  at the end of the file name.
  • To take a screenshot of a specific window or region, type import Pictures/AnyNameOfTheImage.png in the terminal and hit Enter, it will turn the cursor to a selection tool. You just click the mouse button and select the area you want to capture. As you will leave the mouse key, screenshot will be saved in the Pictures folder.
That's all how you can capture screenshot in Kali Linux. This is a very simple and beginner-friendly Kali Linux tutorial to help out all the newbies how they can use this features in need. Hope it will be useful for you.
More information

  1. Hacker Tools For Mac
  2. Hacking Tools For Mac
  3. Nsa Hacker Tools
  4. Best Hacking Tools 2020
  5. Hacker Tools Hardware
  6. Black Hat Hacker Tools
  7. Hacking Tools Usb
  8. Hacking Tools For Windows 7
  9. Hack Tools 2019
  10. Tools Used For Hacking
  11. Hacker Tools Software
  12. Hacking Tools For Windows Free Download
  13. Bluetooth Hacking Tools Kali
  14. Hacking Tools For Mac
  15. Nsa Hack Tools Download
  16. Game Hacking
  17. Hack And Tools
  18. Hack And Tools
  19. Android Hack Tools Github
  20. Hacker Security Tools
  21. Pentest Tools List
  22. Hacking Tools For Mac
  23. Hack Website Online Tool
  24. Pentest Tools Linux
  25. Nsa Hacker Tools
  26. Hacking Tools Download
  27. Hacking Tools Windows
  28. Hacker Tools
  29. Hacking Tools For Mac
  30. Pentest Tools For Android
  31. Hack Tools For Mac
  32. Hacker Tools Hardware
  33. Tools Used For Hacking
  34. Hack Tools Download
  35. Tools For Hacker
  36. Hacker Tools Mac
  37. Pentest Tools Website Vulnerability
  38. How To Install Pentest Tools In Ubuntu
  39. Hack Tools Pc
  40. Kik Hack Tools
  41. Hacking Apps
  42. Pentest Tools For Windows
  43. Hacking Tools Software
  44. Android Hack Tools Github
  45. Free Pentest Tools For Windows
  46. Hacking Tools Mac
  47. Hacking Tools For Windows
  48. Hacker Tools
  49. Pentest Tools Github
  50. Hacker Tools Apk
  51. Hacker Tools For Ios
  52. Hacks And Tools
  53. Hack Website Online Tool
  54. Hacker Tools Apk
  55. Hacker Tools For Mac
  56. Hacker Hardware Tools
  57. Hacking Apps
  58. Hack And Tools
  59. What Are Hacking Tools
  60. Free Pentest Tools For Windows
  61. Hack App
  62. Physical Pentest Tools
  63. Hacking Tools For Windows Free Download
  64. Pentest Tools Port Scanner
  65. Hacking Tools Windows
  66. Hacker Techniques Tools And Incident Handling
  67. Hacker Tools Hardware
  68. Hacker Techniques Tools And Incident Handling
  69. Tools 4 Hack
  70. Easy Hack Tools
  71. Hacking Tools 2020
  72. Hack Tools For Ubuntu
  73. Hackrf Tools
  74. Ethical Hacker Tools
  75. Physical Pentest Tools
  76. Hack Tools
  77. Hacking Tools Mac
  78. Hacking Tools For Pc
  79. Pentest Tools Windows
  80. Hack Tools For Pc
  81. Hacking Tools Windows 10
  82. Termux Hacking Tools 2019
  83. Hacking Tools Online
  84. Hack Tools Online
  85. Hacker Tools For Windows
  86. Pentest Tools Open Source
  87. Hacker Tools
  88. Pentest Tools Kali Linux
  89. Hacker
  90. Computer Hacker
  91. Hack Tools 2019

Linux Command Line Hackery Series - Part 6


Welcome back to Linux Command Line Hackery series, I hope you've enjoyed this series so far and would have learned something (at least a bit). Today we're going to get into user management, that is we are going to learn commands that will help us add and remove users and groups. So bring it on...

Before we get into adding new users to our system lets first talk about a command that will be useful if you are a non-root user.

Command: sudo
Syntax: sudo [options] command
Description: sudo allows a permitted user to execute a command as a superuser or another user.

Since the commands to follow need root privileges, if you are not root then don't forget to prefix these commands with sudo command. And yes you'll need to enter the root password in order to execute any command with sudo as root.

Command: useradd
Syntax: useradd [options] username
Description: this command is used for creating new user but is kinda old school.
Lets try to add a new user to our box.
[Note: I'm performing these commands as root user, you'll need root privileges to add a new user to your box. If you aren't root then you can try these commands by prefixing the sudo command at the very beginning of these command like this sudo useradd joe. You'll be prompted for your root password, enter it and you're good to go]

useradd joe

To verify that this command has really added a user to our box we can look at three files that store a users data on a Linux box, which are:

/etc/passwd -> this file stores information about a user separated by colons in this manner, first is login name, then in past there used to be an encrypted password hash at the second place however since the password hashes were moved to shadow file now it has a cross (x) there, then there is user id, after it is the user's group id, following it is a comment field, then the next field contains users home directory, and at last is the login shell of the user.

/etc/group  -> this file stores information about groups, that is id of the group and to which group an user belongs.

/etc/shadow -> this file stores the encrypted password of users.

Using our command line techniques we learned so far lets check out these files and verify if our user has been created:

cat /etc/passwd /etc/group /etc/shadow | grep joe



In the above screenshot you can notice an ! in the /etc/shadow, this means the password of this user has not been set yet. That means we have to set the password of user joe manually, lets do just that.

Command: passwd
Syntax: passwd [options] [username]
Description: this command is used to change the password of user accounts.
Note that this command needs root privileges. So if you are not root then prefix this command with sudo.

passwd joe



After typing this command, you'll be prompted password and then for verifying your password. The password won't show up on the terminal.
Now joe's account is up and running with a password.

The useradd command is a old school command, lets create a new user with a different command which is kinda interactive.

Command: adduser
Syntax: adduser [options] user
Description: adduser command adds a user to the system. It is more friendly front-end to the useradd command.

So lets create a new user with adduser.

adduser jane



as seen in the image it prompts for password, full name and many other things and thus is easy to use.

OK now we know how to create a user its time to create a group which is very easy.

Command: addgroup
Syntax: addgroup [options] groupname
Description: This command is used to create a new group or add an existing user to an existing group.

We create a new group like this

addgroup grownups



So now we have a group called grownups, you can verify it by looking at /etc/group file.
Since joe is not a grownup user yet but jane is we'll add jane to grownups group like this:

addgroup jane grownups



Now jane is the member of grownups.

Its time to learn how to remove a user from our system and how to remove a group from the system, lets get straight to that.

Command: deluser
Syntax: deluser [options] username
Description: remove a user from system.

Lets remove joe from our system

deluser joe

Yes its as easy as that. But remember by default deluser will remove the user without removing the home directory or any other files owned by the user. Removing the home directory can be achieved by using the --remove-home option.

deluser jane --remove-home

Also the --remove-all-files option removes all the files from the system owned by the user (better watch-out). And to create a backup of all the files before deleting use the --backup option.

We don't need grownups group so lets remove it.

Command: delgroup
Syntax: delgroup [options] groupname
Description: remove a group from the system.

To remove grownups group just type:

delgroup grownups



That's it for today hope you got something in your head.

More articles


  1. Hacker Tools Apk
  2. Nsa Hacker Tools
  3. Hacking Tools
  4. Hacker Tools For Windows
  5. Hack Tool Apk
  6. Pentest Tools Subdomain
  7. Hack Tools For Mac
  8. Pentest Reporting Tools
  9. How To Hack
  10. Android Hack Tools Github
  11. Pentest Tools For Windows
  12. Pentest Tools Online
  13. Pentest Tools Nmap
  14. Hacking Tools Mac
  15. Underground Hacker Sites
  16. World No 1 Hacker Software
  17. Termux Hacking Tools 2019
  18. What Are Hacking Tools
  19. Pentest Box Tools Download
  20. Hack Tools Mac
  21. Tools 4 Hack
  22. Underground Hacker Sites
  23. Hacking Tools Software
  24. Android Hack Tools Github
  25. Github Hacking Tools
  26. Pentest Tools Online
  27. Hacking Tools For Beginners
  28. Hacking Tools Windows
  29. Hacker Tools Software
  30. Hacking Tools Windows 10
  31. Hacker Tools List
  32. Pentest Tools Download
  33. Hacking Tools Pc
  34. Pentest Tools Apk
  35. Pentest Tools Nmap
  36. Hacker Tools For Mac
  37. Pentest Tools Android
  38. Pentest Tools For Windows
  39. Hacking Tools
  40. How To Install Pentest Tools In Ubuntu
  41. Hacking App
  42. Hack Tools Online
  43. Physical Pentest Tools
  44. Pentest Tools Open Source
  45. Pentest Tools Bluekeep
  46. Hack Tools Mac
  47. Growth Hacker Tools
  48. Hacks And Tools
  49. Hacker Tools For Ios
  50. Hacking Tools
  51. Hacking Tools Online
  52. Hacker Search Tools
  53. Pentest Tools Port Scanner
  54. Install Pentest Tools Ubuntu
  55. Hacking Tools Name
  56. Hacking Tools 2020
  57. Pentest Tools Website Vulnerability
  58. Hacker Tools Free
  59. Pentest Automation Tools
  60. Pentest Automation Tools
  61. Hack Tools 2019
  62. Pentest Tools Port Scanner
  63. Pentest Tools For Android
  64. Hacking Tools Windows
  65. Hacks And Tools
  66. Growth Hacker Tools
  67. Nsa Hacker Tools
  68. Beginner Hacker Tools
  69. Hacking Tools Github
  70. Hacking Tools For Windows 7
  71. Pentest Tools Alternative
  72. Pentest Tools Bluekeep
  73. Tools For Hacker
  74. Hacker Tools List
  75. Pentest Tools Apk
  76. Pentest Tools Framework
  77. Hacker Tools Software
  78. Wifi Hacker Tools For Windows
  79. Easy Hack Tools
  80. Hacking Tools And Software
  81. Computer Hacker
  82. Hackers Toolbox
  83. Hacking Tools Download
  84. Hacking Tools 2020
  85. Pentest Tools Windows
  86. Pentest Tools Open Source
  87. Hacker Hardware Tools
  88. New Hacker Tools
  89. Game Hacking
  90. Pentest Tools Apk
  91. What Is Hacking Tools
  92. Hacking Tools And Software
  93. Hacking Tools For Mac
  94. Hacking Tools For Windows
  95. Pentest Tools Free
  96. Hacking Tools Github
  97. Blackhat Hacker Tools
  98. Pentest Tools Download
  99. Install Pentest Tools Ubuntu
  100. Hacker Tools Github
  101. Android Hack Tools Github
  102. Nsa Hack Tools Download
  103. Hack And Tools
  104. Best Hacking Tools 2019
  105. Hackrf Tools
  106. Hacking Tools For Kali Linux
  107. Hacking Tools Usb
  108. Pentest Tools Alternative
  109. Github Hacking Tools
  110. Hacker Tools Linux
  111. Pentest Tools Website

martes, 30 de mayo de 2023

Many Ways Of Malware Persistence (That You Were Always Afraid To Ask)

TL;DR: Are you into red teaming? Need persistence? This post is not that long, read it ;)
Are you into blue teaming? Have to find those pesky backdoors? This post is not that long, read it ;)

In the previous post, I listed different ways how a Windows domain/forest can be backdoored. In this new post, I am digging a bit deeper, and list the most common/known ways malware can survive a reboot, just using local resources of the infected Windows system. The list is far from complete, and I would like to encourage everyone to comment on new methods, not yet listed here.

From an incident response point of view, one of the best strategies to find malware on a suspicious system is to search for suspicious entries that start with the system. In the good old days, you had to check for 2-3 locations to cover 99% of the infections. Nowadays, there are a thousand ways malware can start. The common ones automatically start whenever Windows starts (or the user logs in), but some tricky ones are triggered by other events.

Autoruns

My favorite choice when it comes to malware persistence is Sysinternals tools, Autoruns. In this paragraph, I mainly quote the official built-in help, but bear with me, it is still interesting.

On a side note, there are some problems with the Autoruns tool: it can only run on a live system. (EDIT: This is not true, Autoruns can analyze offline systems as well! Thanks to a comment from Justin.) And usually, this is not the case - I usually have dd images. And although VBoxManage can convert the dd images to VirtualBox disk image format, usually I don't have the time and storage to do that. This is where xmount awesomeness is here to rescue the day. It can convert dd and Encase images on-the-fly in-memory to Virtualbox format. Just attach the disk image to a new Virtualbox machine as the main boot HDD, modify the CPU/disk/controller settings until Windows starts instead of crashing, and voila, you can boot your forensic image - without modifying a single bit on the original evidence dd file. Another problem with malware analysis on a live system is that a good rootkit can fool the analyst easily. 

For quick wins, I usually filter out Microsoft entries, look for per-user locations only and check for unverified (missing or invalid Authenticode) executables. This usually helps to find 90% of malware easily. Especially if it has a color like purple or pink, it is highly suspicious. To find the rest, well, one has to dig deeper.
Zeus "hiding" in the usual random directory - check the faked timestamp
To implement "poor-mans monitoring", regularly save the output of Autoruns, and during incident response, it will be highly valuable. Howto guide here.

Logon

"This entry results in scans of standard autostart locations such as the Startup folder for the current user and all users, the Run Registry keys, and standard application launch locations." 
There are 42 registry keys/folders at the moment in Autoruns, which can be used to autostart a malware. The most common ways are the HKCU\Software\Microsoft\Windows\CurrentVersion\Run and the C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup folder.
One of my favorite regarding this topic is the file-less Poweliks malware, 100% pure awesomeness. Typical ring 3 code execution.

Explorer

"Select this entry to see Explorer shell extensions, browser helper objects, explorer toolbars, active setup executions, and shell execute hooks". 71 registry keys, OMG. Usually, this is not about auto-malware execution, but some of them might be a good place to hide malware.

Internet explorer

"This entry shows Browser Helper Objects (BHO's), Internet Explorer toolbars and extensions". 13 registry key here. If a malicious BHO is installed into your browser, you are pretty much screwed.

Scheduled tasks

"Task scheduler tasks configured to start at boot or logon." Not commonly used, but it is important to look at this.
I always thought this part of the autostart entries is quite boring, but nowadays, I think it is one of the best ways to hide your malware. There are so many entries here by default, and some of them can use quite good tricks to trigger the start.
Did you know that you can create custom events that trigger on Windows event logs?
Did you know you can create malware persistence just by using Windows tools like bitsadmin and Scheduled tasks?
Scheduler in the old days
Scheduler in the new days

Services

HKLM\System\CurrentControlSet\Services is a very commonplace to hide malware, especially rootkits. Check all entries with special care.

Drivers

Same as services. Very commonplace for rootkits. Unfortunately, signing a driver for 64-bit systems is not fun anymore, as it has to be signed by certificates that can be chained back to "Software Publisher Certificates". Typical startup place for Ring 0 rootkits. 
Starting from Windows 10, even this will change and all drivers have to be signed by "Windows Hardware Developer Center Dashboard portal" and EV certificates.

Codecs

22 registry keys. Not very common, but possible code execution.

Boot execute

"Native images (as opposed to Windows images) that run early during the boot process."
5 registry keys here. Good place to hide a rootkit here.

Image hijacks

"Image file execution options and command prompt autostarts." 13 registry key here. I believe this was supposed for debugging purposes originally.
This is where the good-old sticky keys trick is hiding. It is a bit different from the others, as it provides a backdoor access, but you can only use this from the local network (usually). The trick is to execute your code whenever someone presses the SHIFT key multiple times before logging into RDP. The old way was to replace the sethc.exe, the new fun is to set a debug program on sethc.
If you see this, you are in trouble

AppInit

"This has Autoruns shows DLLs registered as application initialization DLLs." Only 3 registry keys here. This is the good old way to inject a malicious DLL into Explorer, browsers, etc. Luckily it is going to be deprecated soon.

Known DLLs

"This reports the location of DLLs that Windows loads into applications that reference them." Only 1 registry key. This might be used to hijack some system DLLs.

Winlogon

"Shows DLLs that register for Winlogon notification of logon events." 7 registry keys. Sometimes used by malware.

Winsock providers

"Shows registered Winsock protocols, including Winsock service providers. Malware often installs itself as a Winsock service provider because there are few tools that can remove them. Autoruns can disable them, but cannot delete them." 4 registry keys. AFAIK this was trendy a while ago. But still, a good place to hide malware.

Print monitors

"Displays DLLs that load into the print spooling service. Malware has used this support to autostart itself." 1 registry key. Some malware writers are quite creative when it comes to hiding their persistence module.

LSA providers

"Shows registers Local Security Authority (LSA) authentication, notification and security packages." 5 registry keys. A good place to hide your password stealer.

Network providers

"Missing documentation". If you have a good 1 sentence documentation, please comment.

WMI filters

"Missing documentation". Check Mandiant for details.

Sidebar gadgets

Thank god MS disabled this a while ago :)
We all miss you, you crappy resource gobble nightmares

Common ways - not in autoruns

Now, let's see other possibilities to start your malware, which won't be listed in Sysinternals Autoruns.

Backdoor an executable/DLL

Just change the code of an executable which is either auto-starting or commonly started by the user. To avoid lame mistakes, disable the update of the file ... The backdoor factory is a good source for this task. But if you backdoor an executable/DLL which is already in Autoruns listed, you will break the Digital Signature on the file. It is recommended to sign your executable, and if you can't afford to steal a trusted certificate, you can still import your own CA into the user's trusted certificate store (with user privileges), and it will look like a trusted one. Protip: Use "Microsoft Windows" as the codesigner CA, and your executable will blend in.
See, rootkit.exe totally looks legit, and it is filtered out when someone filters for "Hide Windows entries".


Hijack DLL load order

Just place your DLL into a directory which is searched before the original DLL is found, and PROFIT! But again, to avoid lame detection, be sure to proxy the legitimate function calls to the original DLL. A good source on this topic from Mandiant and DLL hijack detector.


Here you can see how PlugX works in action, by dropping a legitimate Kaspersky executable, and hijacking the DLL calls with their DLL. 

Hijack a shortcut from the desktop/start menu

Never underestimate the power of lame tricks. Just create an executable which calls the original executable, and meanwhile starts your backdoor. Replace the link, PROFIT! And don't be a skiddie, check the icon ;) I have seen this trick in adware hijacking browsers a lot of times.

IE hijacked to start with http://tinyurl.com/2fcpre6

File association hijack

Choose the user's favorite file type, replace the program which handles the opening with a similar one described in the previous section, and voila!

COM object hijack

The main idea is that some COM objects are scanned for whether they are on the system or not, and when it is registered, it is automatically loaded. See COMpfun for details.

Windows Application Compatibility - SHIM

Not many people are familiar with Windows Application Compatibility and how it works. Think about it as an added layer between applications and the OS. If the application matches a certain condition (e.g. filename), certain actions will take place. E.g. emulation of directories, registry entries, DLL injection, etc. In my installation, there are 367 different compatibility fixes (type of compatibility "simulation"), and some of those can be customized.
Every time IE starts, inject a DLL into IE

Bootkits 

Although bootkits shown here can end up in Autoruns in the drivers section (as they might need a driver at the end of the day), I still think it deserves a different section.

MBR - Master boot record

Malware can overwrite the Master boot record, start the boot process with its own code, and continue the boot process with the original one. It is common for rootkits to fake the content of the MBR record, and show the original contents. Which means one just have attached the infected HDD to a clean system, and compare the first 512 bytes (or more in some cases) with a known, clean state, or compare it to the contents shown from the infected OS. SecureBoot can be used to prevent malware infections like this.
There is a slight difference when MBR is viewed from infected OS vs clean OS

VBR - Volume boot record

This is the next logical step where malware can start it's process, and some malware/rootkit prefers to hide it's startup code here. Check GrayFish for details. SecureBoot can be used to prevent malware infections like this.

BIOS/UEFI malware

Both the old BIOS and the new UEFI can be modified in a way that malware starts even before the OS had a chance to run. Although UEFI was meant to be more secure than BIOS, implementation and design errors happens. Check the Computrace anti-theft rootkit for details.

Hypervisor - Ring -1 rootkit

This is somewhat special, because I believe although rootkit can run in this layer but it can't persist only in this layer on an average, physical machine, because it won't survive a reboot See Rutkowska's presentation from 2006 But because the hypervisor can intercept the restart event, it can write itself into one of the other layers (e.g. install a common kernel driver), and simply delete it after it is fully functional after reboot. Update: There is a good paper from Igor Korkin about hypervisor detection here.

SMM (System Management Mode) malware - Ring -2 rootkit

Somehow related to the previous type of attacks, but not many people know that System Management Mode can be used to inject code into the OS. Check the DEITYBOUNCE malware for more details ;) Also, abusing Intel Dual Monitor Mode (DMM) can lead to untrusted code execution, which basically monitors the SMM mode.

Intel® Active Management Technology - Ring -3 rootkit

According to Wikipedia, "Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them". You can ask, what could possibly go wrong? See Alexander Tereshkin's and Rafal Wojtczuk's great research on this, or Vassilios Ververis thesis about AMT
As not many people click on links, let me quote the scary stuff about AMT:
  • Independent of the main CPU
  • Can access host memory via DMA (with restrictions)
  • Dedicated link to NIC, and its filtering capabilities
  • Can force host OS to reboot at any time (and boot the system from the emulated CDROM)
  • Active even in S3 sleep!

Other stuff

Create new user, update existing user, hidden admins

Sometimes one does not even have to add malicious code to the system, as valid user credentials are more than enough. Either existing users can be used for this purpose, or new ones can be created. E.g. a good trick is to use the Support account with a 500 RID - see here, Metasploit tool here.

Esoteric firmware malware

Almost any component in the computer runs with firmware, and by replacing the firmware with a malicious one, it is possible to start the malware. E.g. HDD firmware (see GrayFish again), graphic card, etc.

Hidden boot device

Malware can hide in one of the boot devices which are checked before the average OS is loaded, and after the malware is loaded, it can load the victim OS.

Network-level backdoor

Think about the following scenario: every time the OS boots, it loads additional data from the network. It can check for new software updates, configuration updates, etc. Whenever a vulnerable software/configuration update, the malware injects itself into the response, and get's executed. I know, this level of persistence is not foolproof, but still, possible. Think about the recently discovered GPO MiTM attack, the Evilgrade tool, or even the Xensploit tool when we are talking about VM migration.

Software vulnerability

Almost any kind of software vulnerability can be used as a persistent backdoor. Especially, if the vulnerability can be accessed remotely via the network, without any user interaction. Good old MS08-067...

Hardware malware, built into the chipset

I am not sure what to write here. Ask your local spy agency for further information. Good luck finding those!

More links

Tools I highly recommend:
For more information, check this blog post, part 1, part 2

Update 2017-04-29: A very nice list of Office persistence: https://labs.mwrinfosecurity.com/blog/add-in-opportunities-for-office-persistence/

Update 2017-10-23: Persistence via Security Descriptors and ACLs: https://www.youtube.com/watch?v=SeR4QJbaNRg

Update 2018-07-25: Backdooring LAPS https://rastamouse.me/2018/03/laps---part-1/
https://rastamouse.me/2018/03/laps---part-2/ 

I would like to thank to Gabor Pek from CrySyS Lab for reviewing and completing this post.
More articles

  1. Pentest Tools Find Subdomains
  2. Hacker Tools List
  3. New Hack Tools
  4. Hacker Tools
  5. Hacking Tools Github
  6. Hacker Tools For Ios
  7. Hacking App
  8. Pentest Recon Tools
  9. New Hack Tools
  10. Hack Tools For Ubuntu
  11. Hacker Tools For Pc
  12. Hacking Tools For Games
  13. Hack Tool Apk
  14. Hacker Tools 2019
  15. Hack Tools
  16. Kik Hack Tools
  17. Pentest Tools Open Source
  18. Hack Tools Github
  19. Hacking Tools Pc
  20. Pentest Tools Website Vulnerability
  21. Best Hacking Tools 2019
  22. Wifi Hacker Tools For Windows
  23. Hacking Tools Online
  24. Hacking Tools Usb
  25. Hacking Tools
  26. Hack App
  27. Hack Apps
  28. Hacker Tools For Windows
  29. Tools 4 Hack
  30. Pentest Tools Website
  31. Hacking Apps
  32. Hacking Tools Windows 10
  33. Pentest Box Tools Download
  34. Underground Hacker Sites
  35. Hacking Tools For Kali Linux
  36. Hacker Tools
  37. Hacking Tools 2020
  38. Termux Hacking Tools 2019
  39. Hacking Apps
  40. Pentest Reporting Tools
  41. Hacker Tools List
  42. Hacker Tools Linux
  43. Hack App
  44. Pentest Tools Github
  45. New Hacker Tools
  46. Hacker Security Tools
  47. Pentest Tools Download
  48. Hacker Tools Online
  49. Pentest Automation Tools
  50. Pentest Tools Kali Linux
  51. Hacker Tools
  52. Hacker Tools List
  53. Pentest Tools Alternative
  54. Hack App
  55. Usb Pentest Tools
  56. Hacker Tool Kit
  57. How To Install Pentest Tools In Ubuntu
  58. Hacker Tools 2020
  59. Hacking Apps
  60. Hacking Tools
  61. Hacker
  62. Hack App
  63. Game Hacking
  64. Tools For Hacker
  65. Top Pentest Tools
  66. Pentest Tools For Mac
  67. Hacker Tools For Ios

Seguidores

Archivo del blog