Intro to Syscalls for Windows Malware

Sdílet
Vložit
  • čas přidán 22. 04. 2023
  • This session features eversinc33 giving an intro to syscalls implementations for Windows malware.
    This is a recording from the Prelude Discord Live Stream Series.
    Click here to join the Prelude Discord: / discord
  • Věda a technologie

Komentáře • 19

  • @Red4mber
    @Red4mber Před 3 měsíci +3

    Damn, that's by far the best explanation i've seen on the subject

  • @alienJIZ1990
    @alienJIZ1990 Před 3 měsíci +1

    Wow, excellent presentation! This topic/attack vector is not nearly covered enough. The space needs more people who understand this and you explained it extremely well

  • @halfbelf5923
    @halfbelf5923 Před 9 měsíci +2

    Thank you for explaination. It was useful for me :) I'm coding on c# maybe 2-3 years and I decide to learn something new about malware etc. but only in this guide I found useful techniques.

  • @joyemoticon
    @joyemoticon Před rokem +6

    Wow! I could not have asked for a better topic. Exactly what I was wanting to learn!

    • @Preludeorg
      @Preludeorg  Před rokem

      Glad to hear this. Huge thanks to eversinc33

  • @CyberCelt.
    @CyberCelt. Před rokem +5

    This is a fantastic intro, thanks a lot

    • @Preludeorg
      @Preludeorg  Před rokem +1

      Glad you enjoyed - all the credit to eversinc33!

  • @lovedoraemon2390
    @lovedoraemon2390 Před 6 měsíci +1

    thanks, this is very clear to understand.

  • @rnrbeast
    @rnrbeast Před 11 měsíci +1

    Very good explanations, thanks for sharing this

  • @eversinc33
    @eversinc33 Před rokem +13

    I just wanna provide some additional info that I missed to give in the talk, but I feel that should be addressed:
    1) The Nt* and Zw* functions, which I call syscalls here, are technically just stdcall wrappers around the actual syscall instruction. The terminology is confusing and many people refer to them as syscalls, but technically they are just wrappers that enable the syscalls to easily be called from C/C++.
    2) When I refer to the usage of GetModuleHandle and GetProcAddress with Nt*/Zw* functions as being suspicious, that is also only partly true. Many legitimate programs, including standard windows binaries, use these calls with Nt*/Zw* functions. What might be suspicious here is the type of APIs you are importing, e.g. if those are known to be used for code injection, not the usage of GetProcAddress/GetModuleHandle itself.

  • @detective5253
    @detective5253 Před rokem +6

    great slide explaination out there. could you please focus more on the practical side? it's gonna be interesting if you dive deep into red team simulation tactics and malware development using C++ and C# for dealing with system calls if possible.

    • @Preludeorg
      @Preludeorg  Před rokem +1

      Thanks for the encouraging words. We'll keep this in mind!

  • @yurim9917
    @yurim9917 Před rokem +3

    👏👏👏

  • @cvport8155
    @cvport8155 Před rokem +1

    Please make more vd for advanced techniques red team and pivoting and dev malware bypass EDR

    • @Preludeorg
      @Preludeorg  Před rokem

      We'll keep this in mind for future content! Thanks for watching.

  • @fakeacount1479
    @fakeacount1479 Před rokem

    hey prelude, can you make video about making your own malware in c++ and testing it in virus total to get 0 detections😮😊