C# payload mastery 02 - remote shellcode + hide console

Sdílet
Vložit
  • čas přidán 14. 07. 2024
  • link to code: github.com/faanross/payloads_...
    previous video: • C# payload mastery 01 ...
    ============================================================
    in this second lesson we'll build on our code from the previous lesson and implement 2 major improvements:
    - switch from hardcoded to remotely-hosted shellcode
    - hide our console window upon payload execution
    live long and prosper,
    x
    ===========================================================
    timestamps
    00:00 - intro
    03:57 - code
    09:15 - test code
    13:13 - outro
    ============================================================
    x.com/faanross
    #redteamint #csharp #cybersecurity

Komentáře • 26

  • @faanross
    @faanross  Před 3 měsíci

    btw i am aware that i incorrectly keep saying 'subjugate' instead of 'subject'... these things happen, i will do better ;)

    • @Cyclically
      @Cyclically Před 2 měsíci +2

      bro is gonna blow up in a few months

    • @faanross
      @faanross  Před 2 měsíci

      @Cyclically thank you bro 🤘🏻

  • @patates1165
    @patates1165 Před 20 dny

    very good videos idk how do you have so low subs but you really deserve more. One of the best teaching and editing cyber security videos out there

    • @faanross
      @faanross  Před 20 dny +1

      hey patates, thanks for the comment - appreciate it. to be frank this is just a labour of love, i originally started it to help me break into industry and land my first job - it already succeeded in that regard. now i'm just continuing because i genuinely enjoy it, it's a way for me to still practice design, animation etc. so not really chasing views, just getting nice comments like this is more than enough for me. hopefully i'll help a few people along the way. keep well.

  • @EnLopXf
    @EnLopXf Před 3 měsíci +1

    Nice I keep supporting your channel

  • @wonkafansonly2005
    @wonkafansonly2005 Před 3 měsíci

    This series is amazing! Thanks for your efforts, looking forward to the next lesson.

  • @Robutnikon
    @Robutnikon Před 3 měsíci +1

    Another Great Vid! Thanks Bro 😎🤘

  • @ohmsohmsohms
    @ohmsohmsohms Před měsícem

    thanks a lot !

  • @nyshone
    @nyshone Před 3 měsíci +1

    Great video. Would you consider showcasing how to work with DInvoke and generally AV evasion in future videos?

    • @faanross
      @faanross  Před 3 měsíci +1

      thanks man and absolutely, just started a new job so the videos are coming out a bit slow but the plan is to stick with a payload course for some time. in the meantime look up ‘jean-francois maes’ he has good vids on d/invoke for c-sharp 🤘🏻

    • @faanross
      @faanross  Před 3 měsíci +1

      czcams.com/video/d_Z_WV9fp9Q/video.htmlsi=mKxC9fIz86rOBEPD

    • @nyshone
      @nyshone Před 3 měsíci

      Thank you for the quick reply. I'm really liking the C# series because I'm already really good with powershell and lot of things overlap here and are easy to understand. However powershell is going to be often disabled in many environments 😅

    • @faanross
      @faanross  Před 3 měsíci +1

      ​@@nyshone yeah there's a good bridge already, powershell is great and then also C# (+ .NET) will open up other options. They are however both great tools to have in your toolbox, PS will still be useful, if not for payloads then for many others tasks. But I think the "age of free lunches" as far as payloads are concerned is now pretty much over, even with C# it's getting harder, hence why we see a return to C since it just gives the most control. (or Rust if you're cool enough, or go if you like giant binaries ;-p).
      I'm paraphrasing but a good quote I heard recently: "in the beginning all you want is results, in the end all you seek is control". cool man thanks for commenting and connecting on x, keep in touch.

  • @johnbarnett722
    @johnbarnett722 Před 2 měsíci +1

    is there a reason you are not using newer versions of dotnet?

    • @faanross
      @faanross  Před 2 měsíci

      no, this is being compiled on a windows 10 vm which is also "the victim", this is not the same machine i am developing on. that's the stock .net that came with the iso file, in a real-world scenario you most likely won't be able to control what framework the target runs.

  • @BigG9982
    @BigG9982 Před 3 měsíci

    broooo when comes the video how to obfuscate the shellcode

    • @faanross
      @faanross  Před 3 měsíci +1

      yooooo - thanks for all your fun comments :) been dragging ass on this last video because side-tracked with another RAT project in rust, but this weekend i'm all hands on deck. next episode touches 7 different improvements, not quite touching shellcode yet we're building up to it - it'll def be in next 3 eps though. i have a lot planned we'll end up making something dope af.

    • @BigG9982
      @BigG9982 Před 3 měsíci +1

      @@faanross niceeee dude, I am excited for your new videos you make great videos i found you today
      please make a shell code obfuscation tut in the future that would be niceeeeee
      yeahhhhhhhhh Addr its a meme for me know lol

    • @faanross
      @faanross  Před 3 měsíci +1

      @@BigG9982 yeah bro it's coming! shellcode obfuscation, i might even getting around to doing a vi on custom shellcode, it's a bit advanced but if you can get to that point it opens so much up. lol i'm happy you appreciate the funky adder - i have a bit of a habit of making inside jokes with myself, so stoked at least one other person enjoyed it lol. keep well amigo till next time.

    • @BigG9982
      @BigG9982 Před 3 měsíci +1

      @@faanross ​ yeah man these jokes are nice and make us laugh in my opinion you make the best tutorials and explain very good
      sorry for my broken english im form germany :D

    • @faanross
      @faanross  Před 3 měsíci +1

      @@BigG9982 you made my day bro thanks for connecting