Usman Sikanderโ€™s Post

View profile for Usman Sikander, graphic

Sr. Offensive Security Researcher | Adversary Emulation | ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€.

๐‚๐จ๐ฆ๐›๐ข๐ง๐ข๐ง๐  ๐”๐ง๐ก๐จ๐จ๐ค๐ข๐ง๐  ๐š๐ง๐ ๐„๐“๐– ๐๐š๐ญ๐œ๐ก๐ข๐ง๐  ๐ฐ๐ข๐ญ๐ก ๐ƒ3๐Œ๐๐’๐„๐‚ ๐ญ๐จ ๐›๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐€๐ฏ/๐„๐ƒ๐‘๐ฌ ๐‹๐จ๐š๐๐ž๐ซ: 1) ETW Patching (EDR monitoring capabilities by strategically patching the Event Tracing for Windows (ETW) framework.) 2) Unhooking ntdll.dll using suspended process. 3) Mapping .text section of hooked ntdll.dll with clean copy. 5) Shellcode as a MAC ๐’๐ก๐ž๐ฅ๐ฅ๐œ๐จ๐๐ž: 1) Direct syscalls to dump lsass memory 2) Random Procedures and Prototypes 3) Dynamic syscalls resolve using PEB Lookup ๐‘๐ž๐Ÿ 1: https://lnkd.in/dyKmggBf ๐‘๐ž๐Ÿ 2: https://lnkd.in/dh8VCnt8 ๐‘๐ž๐Ÿ 3: https://lnkd.in/ddP27HGB

Hamza Rabbani

Penetration Tester / Software Developer | CRTO | eCPTX | PNPT | CRTP | OSCP | eCPPT | CHFI | eMAPT | CEH Practical | Cyber Security Trainer | Ethical Hacker

4mo

Perfect! have you tested it with Bitdefender?

Marc S.

โ˜ sรฉcuritรฉ offensive OFFSECโ˜ Veille informatique๐Ÿดโ˜ ๏ธCTF PLAYER๐Ÿดโ˜ ๏ธ(hands on keyboard)๐Ÿดโ˜ ๏ธjuste un passionnรฉ (Ethical Hacker) autodidacte๐Ÿดโ˜ ๏ธHumour & cafรฉ trรจs noir // 300 oliviers et des chรจvres dans le Larzac ...

4mo

Thank you Usman great articles !

See more comments

To view or add a comment, sign in

Explore topics