Sec Note – Telegram
Sec Note
1.4K subscribers
83 photos
5 videos
31 files
155 links
Download Telegram
New blog on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that identified by author in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.


Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.

https://github.com/passthehashbrowns/Being-A-Good-CLR-Host



Related Works and Resources
HostingCLR - Original implementation of CLR hosting

InlineExecute-Assembly - Original implementation of executing .NET assemblies as a BOF

Dealing with Failure: Failure Escalation Policy in CLR HostsThis is the only real example I could find of offensive tradecraft using CLR Customizations when I was initially doing this research.

Hosted Pumpkin A GitHub repository containing a proof-of-concept for implementing several CLR Customizations.

Shellcode: Loading .NET Assemblies From MemoryDonut was a great deal of help in wrangling all of the relevant data structures and definitions in C.

Customizing the Microsoft .NET Framework Common Language Runtime by Steven Pratschner – This is the definitive text on CLR Customizations. Simply a must-read if you have any interest in this area.





#redteam #net #clr #dotnet
👾2
Feeling overwhelmed trying to learn security research? (Analyzing the PayloadRestrictions.dll Export Address Filtering)

Check out the "Process of Step-by-Step" by Yarden Shafir — a great resource that breaks it down clearly.

#research #reverse #internals
Sec Note pinned «The .NET Export Portal Via XPN A while back I published a post looking at how to craft a .NET assembly which exposes managed code via DLL exports, RunDLL32 your .NET. While working on some tooling recently I revisited this topic and wanted to know just why…»
Dotnet_IMsGTC6.pdf
2.3 MB
Dotnetfile: parsing .NET PE files has never been easier

Video by Yaron Samuel
FromaCprojectthroughassemblytoshellcodeHasherezade.pdf
1.3 MB
Write your own shellcode
From a C project through assembly to shellcode Hasherezade


#shellcode
aiya-mmd-book.pdf
31.8 MB
AIYA MMD - means Attack and Introduction or (Android and IOS), start Your Adventure in Mobile Malware Development. also AIYA means AIYA Nurkhankyzy.

https://github.com/cocomelonc/bsprishtina-2024-maldev-workshop/

#mobile
👾4
Obfusk8: C++17-Based Obfuscation Library

Obfusk8 is a lightweight, header-only C++17 library designed to significantly enhance the obfuscation of your applications, making reverse engineering a substantially more challenging endeavor. It achieves this through a diverse set of compile-time and runtime techniques aimed at protecting your code's logic and data.


#obf
Spoofing Call Stacks To Confuse EDRs

Call stacks are an understated yet often important source of telemetry for EDR products. They can provide vital context to an event and be an extremely powerful tool in determining false positives from true positives (especially for credential theft events such as handle access to lsass).


#evasion