Главная
Study mode:
on
1
Introduction
2
Outline
3
Offensive Recon
4
Live Retooling
5
Strategic Purpose
6
Tactical Purpose
7
Current Mechanisms
8
Net Advantages
9
Applying CodeDom
10
Using the API
11
Seesaw
12
Dynamic Compilation
13
Disadvantages
14
CSS Extensions
15
Temporary DLL
16
Generate in Memory
17
Process Monitor
18
Removing artifacts
19
Deleting files
20
Application Domains
21
Interop
22
Compile Time Lock
23
Dynamic Retool
24
Why not compile
25
Review
26
Dynamic Linking Runtime
27
Python
28
Python Code
29
DLR
30
Assembly DLL
31
Python R
32
Code as payload
33
Invalid dll dependency
34
Load DLL from resources
35
Build Block Ideas
36
Net Modules
37
Config
38
Reflection
39
Memory Map
40
Zip Archive
41
CSharp
42
IronPython
43
PowerShell
44
Delirium
45
Managed Execution Toolkit
46
Application Whitelisting
47
Proof of Concept
Description:
Explore offensive reconnaissance and live retooling techniques for red teams in this conference talk from Circle City Con 5.0. Learn about strategic and tactical purposes of retooling, current mechanisms, and advantages of using .NET. Discover how to apply CodeDom, utilize APIs, and implement dynamic compilation. Examine disadvantages and explore CSS extensions, temporary DLLs, in-memory generation, and process monitoring. Delve into removing artifacts, deleting files, application domains, and interop. Investigate compile-time locks, dynamic retooling, and dynamic linking runtime. Explore Python integration, DLR, assembly DLLs, and using code as payload. Gain insights on invalid DLL dependencies, loading DLLs from resources, and various build block ideas including .NET modules, reflection, memory mapping, and zip archives. Cover C#, IronPython, PowerShell, and managed execution toolkit concepts. Conclude with application whitelisting and a proof of concept demonstration.

Quick Retooling in Net for Red Teams

Add to list
0:00 / 0:00