 |
crypter 2024 |
Regarding/goal
The backdoor generation tool crypter nj circumvents antivirus detection by using injection and cryptography techniques. More particular still:
It encrypts a supplied shellcode using AES encryption.
creates an executable file with the payload encrypted in it.
With a variety of injection techniques, the shellcode is decrypted and injected into the target system.
- Portable executable injection which involves writing malicious code directly into the process (without a file on disk) then invoking execution with either additional code or by creating a remote thread. The displacement of the injected code introduces the additional requirement for functionality to remap memory references. Variations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue
- Thread execution hijacking which involves injecting malicious code or the path to a DLL into a thread of a process. Similar to Process Hollowing, the thread must first be suspended.
Install Mono according to your linux distribution, download and run the binaries
root@kali# apt install mono-devel
root@kali# mono aviator.exe
Opinions:
Post a Comment