Malware Development: System Calls

Sdílet
Vložit
  • čas přidán 5. 07. 2024
  • #Malware #Development
    🦠 Use code "CROW10" for 10% OFF your order when you checkout at Maldev Academy! maldevacademy.com/?ref=crow
    I sincerely hope you enjoyed watching this installment of our ongoing malware development series. I know the kernel debugging portion was a bit rushed, and for that, I apologize. I had an entire segment dedicated to kernel debugging, the intricacies of MSRs as well as the incredible CPUID instruction, and all of that planned out for this video but as you could imagine, had I included that, the video would be a month-long. So instead, I'm working on a blog post that will take you into harrowing depths of that entire process, so make sure you look out for it here: www.crow.rip/
    Either way, thank you so much for watching, nerds! :D
    🌐 Websites/Things Mentioned + Extra Reading:
    Once I finish my blog, I'll include a link to the references section which will have all of these links and a LOT more.
    Intel® 64 and IA-32 Architectures Software Developer Manuals: www.intel.com/content/www/us/...
    A Syscall Journey in the Windows Kernel: alice.climent-pommeret.red/po...
    The Quest for the SSDTs: www.codeproject.com/Articles/...
    System Service Descriptor Table - SSDT: www.ired.team/miscellaneous-r...
    OS2's Free Internals Course: p.ost2.fyi/courses/course-v1:...
    HellsGate: github.com/am0nsec/HellsGate/...
    Direct Syscalls vs Indirect Syscalls: redops.at/en/blog/direct-sysc...
    ByePg: Defeating Patchguard using Exception-hooking: blog.can.ac/2019/10/19/byepg-...
    Infinity Hook: github.com/everdox/InfinityHook
    GhostHook - Bypassing PatchGuard with Processor Trace Based Hooking: www.cyberark.com/resources/th...
    ⚠️ Disclaimer:
    The information presented in this video is for educational purposes only. It is not intended to be used for illegal or malicious activities. The creator and any individuals involved in the production of this video are not responsible for any misuse of the information provided. It is the responsibility of the viewer to ensure that they comply with all relevant laws and regulations in their jurisdiction.
    💖 Support My Work
    / cr0w
    ko-fi.com/cr0ww
    www.buymeacoffee.com/cr0w
    Join this channel to get access to perks:
    / @crr0ww
    🔖 My Socials
    / discord
    www.crow.rip/
    github.com/cr-0w
    / cr0ww_
    The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
    Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
    🕰️ Timestamps:
    00:00 - Intro
    02:38 - Learn Malware Development
    04:26 - Today's Agenda
    05:07 - Recap
    07:48 - Post Syscall Invocation
    16:20 - Direct Syscalls
    20:05 - API Hooking Demo
    25:36 - Back to Direct Syscalls
    37:53 - Indirect Syscalls
    44:28 - Outro
  • Věda a technologie

Komentáře • 124

  • @crr0ww
    @crr0ww  Před 5 měsíci +13

    📌 Use code "CROW10" for 10% off your order when you checkout at Maldev Academy or use this link: maldevacademy.com/?ref=crow
    Font: Terminess Nerd Font Mono
    Colourscheme: Zero (Dark Theme)
    I sincerely hope you enjoyed watching this installment of our ongoing malware development series. I know the kernel debugging portion was a bit rushed, and for that, I apologize. I had an entire segment dedicated to kernel debugging, the intricacies of MSRs as well as the incredible CPUID instruction, and all of that planned out for this video but as you could imagine, had I included that, the video would be a month-long. So instead, I'm working on a blog post that will take you into harrowing depths of that entire process, so make sure you look out for it here: www.crow.rip/
    ERRATA:
    - I just realized after rewatching this that I was doing "CONST LPCSTR" when that's not necessary at all since LPCSTR is literally: "typedef const char* LPCSTR;" HAHAHAH LOSING MY MIND
    tysm for watching, nerds. luv u all terribly

  • @C5pider
    @C5pider Před 5 měsíci +115

    Oh mom look i made it into a crow video.

  • @bamboooz3201
    @bamboooz3201 Před 5 měsíci +26

    I am a web developer, i don't understand anything, but i love these videos, keep it up!

    • @crr0ww
      @crr0ww  Před 4 měsíci +3

      aw thank you

  • @gato4920
    @gato4920 Před 5 měsíci +17

    Have not even made it this far in the series, but I had to show support. Keep it up, we appreciate you.

    • @crr0ww
      @crr0ww  Před 4 měsíci +2

      i really appreciate that! thank you so much

  • @user-ik4px2cu1l
    @user-ik4px2cu1l Před 5 měsíci +7

    I literally just finished watching your Native API video and now you upload this, - literally GOD.

  • @t32prod.98
    @t32prod.98 Před 4 měsíci

    just came across your page by pure chance and watched your processes, handles, and threads video. headed over to your website and your statement in the faq section was very wholesome and encouraging. thank you for documenting your journey and having a positive outlook for newcomers :) deff earned my sub and a bookmark to your blog.

  • @Raxis
    @Raxis Před 4 měsíci +2

    Hell yes another crow video! Still need to go back and catch up on the previous vid but it's great seeing more stuff from you!

  • @gamerkarir306
    @gamerkarir306 Před 5 měsíci +7

    omg you gave me a hart attack with the fear and hunger sound 1:25

  • @jaitjacob
    @jaitjacob Před 4 měsíci +7

    babe wake up crow just uploaded a new malware video

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      WAKE BABE UP, WE HAVE MALWARE TO MAKE

  • @Ale_Dev
    @Ale_Dev Před 5 měsíci +4

    Man!!! Finally a new video :D Didn't still watched it entirely but it's obviously gonna be fantastic. Ik doing this videos takes time and commitment but please do them more often ahah!

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      thank you so much!! yeah it's a ton of work but your response(s) make all of the grey hairs super worth it :)

  • @theanvils2
    @theanvils2 Před 5 měsíci +2

    Your videos are so good, my tiny brain can finally understand all this stuff. Keep it up!

  • @sxmourai6897
    @sxmourai6897 Před 4 měsíci +4

    I'm currently making an os and it's great to see the point of view of the userland people on the other side =)
    + I've learned some stuff, it's grealty explained, continue like that !

    • @crr0ww
      @crr0ww  Před 4 měsíci

      thank you so much! :)

  • @QEVDX8mibX8M
    @QEVDX8mibX8M Před 2 měsíci

    I've just discovered your channel and OMG keep it up man, you're a GEMMMM

  • @tablettablete186
    @tablettablete186 Před 4 měsíci

    This is why we need syscall kernel interception like we do in Linux with SECCOMP.
    Great video by the way!

  • @rosehacksyoutube
    @rosehacksyoutube Před 4 měsíci

    Quality! Your channel is going to blow up.

  • @4sakenGol3m
    @4sakenGol3m Před 2 měsíci

    Your LOCO❤😂 4:16 Love the content; keep up the incredible work!

  • @vizzil1675
    @vizzil1675 Před 4 měsíci

    I just finished my os class. Really love it haha

  • @EnLopXf
    @EnLopXf Před 4 měsíci +2

    Yow the legend is back!!

  • @christian_leone
    @christian_leone Před 5 měsíci +3

    Nice vid as always crow, thanks

    • @crr0ww
      @crr0ww  Před 4 měsíci

      thank you so much! i'm really happy you liked it :)

  • @user-os4kc1uo7o
    @user-os4kc1uo7o Před 5 měsíci +3

    He's finally back after his hibernation

  • @lime5233
    @lime5233 Před 5 měsíci +2

    FINALLY A VIDEO

  • @muha0644
    @muha0644 Před 4 měsíci +4

    Man you gotta make more videos, you're the new liveoverflow but more funny and less serious.

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      thank you so much for your comment; I really appreciate that! liveoverflow's the GOAT tho :')

    • @muha0644
      @muha0644 Před 4 měsíci

      @@crr0ww yeah, he is!
      But ever since he started using his face on camera his videos seem too "formal" or professional. More like John Hammond, but if he was German I guess...

  • @phantompuma228
    @phantompuma228 Před 5 měsíci +3

    NEW CROW VID?? LETS GOOO

  • @11superjump
    @11superjump Před 5 měsíci +2

    this video taught me a lot, love it :)

    • @crr0ww
      @crr0ww  Před 4 měsíci

      ah, great!! that means i've done my job haha thank you so much for commenting

  • @arnabthakuria2243
    @arnabthakuria2243 Před 4 měsíci

    Great vid as always. What font is that ?

  • @azdirtnaper
    @azdirtnaper Před 4 měsíci +1

    I love watching these even though I don't understand any of the shit that is going on lmaooo

  • @mnesicles.
    @mnesicles. Před 4 měsíci

    Sos un capo cuervito. Excelente contenido ✨

  • @Negalijus370
    @Negalijus370 Před 5 měsíci +2

    Inspiring next generation of Greybeards ⚡⚡

  • @Gorro1855
    @Gorro1855 Před 4 měsíci

    Awesome ❤ Thanks!What a theme name in visual studio bro?

  • @dadamnmayne
    @dadamnmayne Před 4 měsíci +6

    Thank you. Prob going to watch this at least 100 times.

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      i appreciate you, brother! thank you so so much

    • @dadamnmayne
      @dadamnmayne Před 4 měsíci

      @@crr0ww 19:01 that API hooking/unhooking video tho... 🙏

  • @korsate
    @korsate Před 5 měsíci +2

    YAYAYAYAYAYA MY GOAT UPLOADED

  • @user-os4kc1uo7o
    @user-os4kc1uo7o Před 5 měsíci +2

    CROW SIR SIR CROW YESSSSSSSSSSSSSS

  • @HTWwpzIuqaObMt
    @HTWwpzIuqaObMt Před 5 měsíci +2

    Welcome back ❤

  • @ferverrel5519
    @ferverrel5519 Před 4 měsíci

    Used your promo for the maldev academy baby!

  • @Beryesa.
    @Beryesa. Před 4 měsíci +2

    Operation Tux continues 😅

  • @faanross
    @faanross Před 5 měsíci +3

    He’s back!

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      hey!! thank you so much for commenting, brother! i LOVE your videos as well, such a unique style! keep up the GREAT work, you'll get really far I can already tell

    • @faanross
      @faanross Před 4 měsíci

      @@crr0ww 🖤

  • @backinyourcommentsectionag3191

    CROW WHERE HAVE YOU BEEN
    I MISS YOU LOVE

  • @stolfoch.
    @stolfoch. Před 5 měsíci +2

    mr crow i love you

  • @ericytff7388
    @ericytff7388 Před 4 měsíci

    MORE TUTORIALLS WE SHALL SEE

  • @meharklair3755
    @meharklair3755 Před 5 měsíci +2

    CROW CROW CROW

  • @alec3217
    @alec3217 Před 5 měsíci +3

    LESS FUCKING GOOOOOOOOO, new crow vid

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

    • @alec3217
      @alec3217 Před 4 měsíci

      @crr0ww do you have a discord server or something similar?

  • @tracetv8115
    @tracetv8115 Před 4 měsíci

    A video about antivirus intrusion would be nice.

  • @Trikstarck
    @Trikstarck Před 5 měsíci +2

    Let’s GOOOOOO 🎉🎉🎉🎉🎉🎉

  • @madezra64
    @madezra64 Před 4 měsíci

    What's the music at 11:50? Starts a little earlier then that but Shazam as failing me cause it's copyright free music :(

  • @dompurified
    @dompurified Před 4 měsíci

    mom, look! cr0w uploaded!

  • @brunom12111
    @brunom12111 Před 4 měsíci

    that's my goat right there

  • @noorkhara1429
    @noorkhara1429 Před 5 měsíci +2

    HES BACKKKKK !!!!! 🎉🎉🎉🎉

  • @synrage
    @synrage Před 4 měsíci +2

    finally bro

  • @czerwonejakmleko401
    @czerwonejakmleko401 Před 4 měsíci

    does anyone know what font he uses?

  • @PlanetComputer
    @PlanetComputer Před 5 měsíci +2

    thanks crow

    • @crr0ww
      @crr0ww  Před 4 měsíci

      it's my pleasure

  • @meharklair3755
    @meharklair3755 Před 5 měsíci +2

    i would like to inject my malware into crow :3

  • @Bl45ty
    @Bl45ty Před 4 měsíci +2

    _

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      HAHAHAHA LETS GOOOOO i wrote it down on some sticky notes so I don't forget it again :')

    • @Bl45ty
      @Bl45ty Před 4 měsíci

      @@crr0ww 😂♥

  • @vesmirnyjay
    @vesmirnyjay Před 5 měsíci +2

    touching everything

  • @GHOST-qx6wi
    @GHOST-qx6wi Před 4 měsíci +2

    finally

  • @gordonfreimann
    @gordonfreimann Před 4 měsíci

    whats your font in vs?

  • @ElectrostatiCrow
    @ElectrostatiCrow Před 5 měsíci +2

    Nice

  • @NightlockHayze
    @NightlockHayze Před 4 měsíci +1

    Crow why did you just ignore us and drop this new video asdjasdhakjdadasda ily always

  • @dneial.
    @dneial. Před 4 měsíci

    Can anyone link the equivalent of this but on Mac plz 🤗

  • @DM-qm5sc
    @DM-qm5sc Před 5 měsíci

    Imagine calling pantaloons trousers LuL

  • @honestsniping1
    @honestsniping1 Před 4 měsíci

    Aren't all variables saved in the .TEXT section either way? Why did he manually added that code at 29:00?

    • @nikhilt3755
      @nikhilt3755 Před 3 měsíci

      variables go into .data section.
      if we specify to allocate in .text section then contents of our variable can be executed because .text section is executable by default

    • @honestsniping1
      @honestsniping1 Před 3 měsíci

      Thanks for the reply. But if I define the shellcode variable inside main(), it will be located in .TEXT and not .DATA. And after your logic, it would mean that shellcodes defined in the global section of the program (not within main) cannot be executed.
      I'm probably missing something here...

  • @cagdasisk7640
    @cagdasisk7640 Před 4 měsíci

    ur the best

  • @DaxSudo
    @DaxSudo Před 4 měsíci

    All of this just serves my point. The NT Kernel f***ing sucks balls.

  • @mohammedzaid6634
    @mohammedzaid6634 Před 5 měsíci +2

    Hey crow whats up man ✋

    • @crr0ww
      @crr0ww  Před 4 měsíci

      hey!! how are you :P

  • @hiddengo3232
    @hiddengo3232 Před 2 měsíci

    how to modify exploit code

  • @snapshot8886
    @snapshot8886 Před 5 měsíci +2

    Bro!!!

  • @imahotdogdonteatme8722
    @imahotdogdonteatme8722 Před 5 měsíci +2

    Holy shit! I thought yt assasinated him!

    • @crr0ww
      @crr0ww  Před 4 měsíci

      THEY GOT REALLY *REALLY* close 😓 still have more videos to make, can't stop now :')

  • @hell0kitje
    @hell0kitje Před 5 měsíci +2

    MOB PSYCHO 100!

    • @fodk7021
      @fodk7021 Před 4 měsíci

      What do you mean ?

    • @hell0kitje
      @hell0kitje Před 4 měsíci

      @@fodk7021 its anime.

    • @fodk7021
      @fodk7021 Před 4 měsíci

      @@hell0kitje yes but where is it in the video.

    • @hell0kitje
      @hell0kitje Před 4 měsíci

      @@fodk7021 its in thumbail

    • @fodk7021
      @fodk7021 Před 4 měsíci

      @@hell0kitje I thought it was midoriya from my hero academia

  • @SpYlE-
    @SpYlE- Před 4 měsíci

    bro.. iam from bangldesh ..plzz make more video

  • @ReconTechBF3
    @ReconTechBF3 Před 4 měsíci +1

    all your syscalls are belong to us

  • @uh3906
    @uh3906 Před 5 měsíci +2

    Lmao just thought about you yesterday

  • @sinatra02
    @sinatra02 Před 4 měsíci

    a group of crows are called a murder... are we, as your fan base... murderers?

  • @4sakenGol3m
    @4sakenGol3m Před 2 měsíci

    WTF 9:56 😂😂😂😂😂😂😂😂

  • @lavender0666
    @lavender0666 Před 5 měsíci +4

    hot

  • @lumikarhu
    @lumikarhu Před 4 měsíci

    a more in-depth video on indirect syscalls would be great, im not sure everything was covered, noob here. i can only cross check with the maldevs module.
    PS. i came with the power of thousand suns, you should get exclusive rights for maldev sponsoring, why watch boring jurassic park man when crow videos exist?
    lmfao please mr. d0x do this, the world will be a better place if crow becomes THE teacher. me not knowing C and low level programming well had some difficulties understanding the material but now so much has gotten clearer it's not even funny. ILY Crow

  • @jacobjohnson1501
    @jacobjohnson1501 Před 5 měsíci +2

    heyyo you're alive ?

  • @raven-vr5yz
    @raven-vr5yz Před 5 měsíci +2

    yo man nice nickname

    • @crr0ww
      @crr0ww  Před 4 měsíci +1

      thank you RAVEN, nice nickname as well, RAVEN :>

  • @nordgaren2358
    @nordgaren2358 Před 4 měsíci

    Lmao. Urien spotted.

  • @mongru
    @mongru Před 5 měsíci +2

    ah yes here i am again

    • @crr0ww
      @crr0ww  Před 4 měsíci

      and i'm so happy u are

  • @lumikarhu
    @lumikarhu Před 4 měsíci

    psst hey kid, wanna buy some skooma?

  • @Mika_565
    @Mika_565 Před 5 měsíci +5

    Thats cool but how do I get free robux

    • @crr0ww
      @crr0ww  Před 4 měsíci +3

      YOU THINK I'M AT *THAT* LEVEL, MIKA? THAT'S TOO ADVANCED FOR ME!1:$!$:

  • @meharklair3755
    @meharklair3755 Před 5 měsíci +2

    crow is so sexy

  • @Bo_om2590
    @Bo_om2590 Před 4 měsíci

    do you have a job?
    what is it?

  • @theexplosionist2019
    @theexplosionist2019 Před 4 měsíci

    I don't understand what you're trying to achieve. You can't do "useful" functions such as virtualalloc or openprocess to modify processes' memory without admin access.
    Inline assembly works in VS2022 just fine.
    I was thinking rax is the GetProcAddress but its a special number. That makes using syscall even more pointless.
    unsigned long long count = 9;
    __asm {
    mov rax, 31H
    lea r10, count
    xor edx,edx
    xor r8d, r8d
    xor r9d, r9d
    sub rsp,40
    syscall
    add rsp,40
    }
    std::cout