从 BYOVD 到 0-day:揭露网络招聘骗局中的高级漏洞利用.pdf

编号:615430 PDF 33页 1.98MB 下载积分:VIP专享
下载报告请您先登录!

从 BYOVD 到 0-day:揭露网络招聘骗局中的高级漏洞利用.pdf

1、#BHASIA BlackHatEventsFrom BYOVD to a 0-day:Unveiling Advanced Exploits inCyber Recruiting ScamsSpeakers:Luigino Camastra,Igor MorgensternContributor:Jan Vojtesek#BHASIA BlackHatEventsAgenda Introduction to prior research Attack chain analysis Initial ISO image Loaders RAT 0-day and vulnerability an

2、alysis Rootkit analysis#BHASIA BlackHatEventsPrior research#BHASIA BlackHatEventsAttack chain analysisThe attack is initiated by presenting a fabricated job offerContacting via LinkedIn,WhatsApp,email or other platforms#BHASIA BlackHatEventsAttack chain analysisRollFling LoaderShellcode executed in

3、memoryDiscovered a new loader we called RollFling and NLS fileMalicious DLL established as a serviceKickstart execution chainLoading next stageobtaining XOR key by calling GetSystemFirmwareTable APIXOR decryption of file with.nls extensionRollSling loader is encrypted in NLS fileLoading decrypted Ro

4、llSling into memory#BHASIA BlackHatEventsAttack chain analysisRollSling is a loader discussed in Microsoft research(Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability)Code similarities with the RollSling version discussed in the Microsoft research Gen Digitale68

5、ff1087c45a1711c3037dad427733ccb1211634d070b03cb3a3c7e836d210f Microsoft d9add2bfdfebfa235575687de356f0cefb3e4c55964c4cb8bfdcdc58294eeaca#BHASIA BlackHatEventsAttack chain analysisRollSling LoaderLocate binary blobHolds various stages and configuration dataRollMid,2x DLL binaries and address of C&C s

6、erverLocated without file extensionExtracting the next stage from binary blobSearching for export function StartActionLoading and executing the next stage RollMid(by calling StartAction export function)#BHASIA BlackHatEventsAttack chain analysisRollMid LoaderLoading network module binary,parsing add

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(从 BYOVD 到 0-day:揭露网络招聘骗局中的高级漏洞利用.pdf)为本站 (鲁大师) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠