Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

BSides DC 2019 - PErfidious: Make PE backdooring great again!

Автор: BSides DC

Загружено: 2019-10-30

Просмотров: 227

Описание:

Until now, the techniques used for backdooring and code injection in PE files have been restricted mainly to the following:

Finding code-caves, injecting the malicious code in those code-caves, changing the entry-point of the program to point to these code caves.
Adding a new section to the PE file, adding malicious code to the section, making the section executable.

These approaches impose restrictions on the size of code that can be injected and they’re extremely prone to identification by endpoint detection systems. The endpoint detection systems can:

verify whether the sizes of various sections mentioned in the section table match with their actual sizes in the PE file.
check for unusual section names in the PE file to identify sections that have been appended to the end of the PE file.
check the section table for permissions granted to various sections of the PE file to identify sections other than .text or other standard section that have been granted suspicious permissions.

This is where PErfidious comes into play. PErfidious is a Python3 tool that aims to directly take a benign PE executable and malicious shellcode, transform the malicious shellcode and inject the transformed shellcode into various parts of the executable’s .text section, thus completely avoiding the need to look for code-caves or creating additional sections. After injection, PErfidious recalculates the size of the .text section and all the virtual address changes caused by the increase in the size of the .text section and modifies respective fields in the PE header, thus making sure that the PE file doesn’t look injected.
Shreyans Doshi
(Malware Research Intern at Cybrary Inc.)

My name is Shreyans Devendra Doshi. I am a Cybersecurity Graduate Student at the University of Maryland, College Park. I have previously worked as a Malware Research Intern at Cybrary Inc., where I created PErfidious and researched on other techniques that can be used to bypass modern endpoint detection systems. I have also worked as a teaching assistant for a graduate course on Big Data Analytics and as a research intern with the Department of Science and Technology, Government of India. My main areas of interests are reverse-engineering, malware analysis, exploit development and intersection between software security and machine learning. I am also an avid anime and movie fan.

BSides DC 2019 - PErfidious: Make PE backdooring great again!

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

BSides DC 2019 - 28 Seconds Later: The Epidemiological Triangle & Other Models for Influence Ops

BSides DC 2019 - 28 Seconds Later: The Epidemiological Triangle & Other Models for Influence Ops

BSides DC 2019 - Hands-on Writing Malware in Go

BSides DC 2019 - Hands-on Writing Malware in Go

4 Hours Chopin for Studying, Concentration & Relaxation

4 Hours Chopin for Studying, Concentration & Relaxation

BSides DC 2019 - Signing your code the easy way

BSides DC 2019 - Signing your code the easy way

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

BSides DC 2019 - Breaking Through the Boundaries of Cyber Security Job Search Challenges

BSides DC 2019 - Breaking Through the Boundaries of Cyber Security Job Search Challenges

Биномиальные распределения | Вероятности вероятностей, часть 1

Биномиальные распределения | Вероятности вероятностей, часть 1

Где начало СХЕМЫ? Понимаем, читаем, изучаем схемы. Понятное объяснение!

Где начало СХЕМЫ? Понимаем, читаем, изучаем схемы. Понятное объяснение!

BSides DC 2019 - Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK

BSides DC 2019 - Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK

Circular AI Deals Fuel Bubble Debate | Bloomberg Tech: Asia 11/28/25

Circular AI Deals Fuel Bubble Debate | Bloomberg Tech: Asia 11/28/25

BSides DC 2019 - 0-day Research Disassembled

BSides DC 2019 - 0-day Research Disassembled

Материалы Unreal Engine 6 уровней сложности

Материалы Unreal Engine 6 уровней сложности

Подробно о HTTP: как работает Интернет

Подробно о HTTP: как работает Интернет

Что Случится, Если в Атмосфере будет 100% КИСЛОРОДА?

Что Случится, Если в Атмосфере будет 100% КИСЛОРОДА?

Magical Christmas Lights | Art Frame Screensavers | Art for your TV | 4K

Magical Christmas Lights | Art Frame Screensavers | Art for your TV | 4K

BSides DC 2019 - Overcoming Workforce Retention & Recruitment Challenges in  Cybersecurity

BSides DC 2019 - Overcoming Workforce Retention & Recruitment Challenges in Cybersecurity

BSides DC 2019 - IAM what IAM and dats what IAM: accounts for everyone! Robots too!

BSides DC 2019 - IAM what IAM and dats what IAM: accounts for everyone! Robots too!

BSides DC 2019 - Using JA3. Asking for a friend?

BSides DC 2019 - Using JA3. Asking for a friend?

BSides DC 2019 - SCADA: What the next Stuxnet will look like and how to prevent it

BSides DC 2019 - SCADA: What the next Stuxnet will look like and how to prevent it

Мессенджер Max - это аналог китайского WeChat. Но самом деле это не так

Мессенджер Max - это аналог китайского WeChat. Но самом деле это не так

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]