Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 2 days ago

Abusing Microsoft Warbird for Shellcode Execution - from 2024 but recently utilised in the Notepad++ payloads

cirosec.de

external-link
message-square
0
link
fedilink
5
external-link

Abusing Microsoft Warbird for Shellcode Execution - from 2024 but recently utilised in the Notepad++ payloads

cirosec.de

digicatM to blueteamsecEnglish · 2 days ago
message-square
0
link
fedilink
Abusing Microsoft Warbird for Shellcode Execution - cirosec
cirosec.de
external-link
November 7, 2024 - In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions. We’ll show how we can encrypt our shellcode and let the Windows kernel decrypt and load it for us using the Warbird API. Author: Jan-Luca Gruber and Frederik Reiter
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 15 users / day
  • 111 users / week
  • 260 users / month
  • 917 users / 6 months
  • 220 local subscribers
  • 611 subscribers
  • 2.27K Posts
  • 175 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.13
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org