官术网_书友最值得收藏!

  • Hands-On Red Team Tactics
  • Himanshu Sharma Harpreet Singh
  • 134字
  • 2021-08-13 15:36:46

Weaponization

The main aspect of this phase is to weaponize the malware that will be delivered to the target system. The malware could be a simple meterpreter payload, Empire agent, Koadic stager, or a complex custom-coded program. The type of malware depends on the level of adversaries. If the adversary is highly skilled, he/she would mostly use a custom coded malware to avoid detection. Even if the adversaries are using meterpreter (a downloader embedded in a Microsoft office document macro that would download and inject the meterpreter payload into the memory) as their weaponized malware, they still need to obfuscate, encode, and encrypt the payload for bypassing general & latest protection mechanisms. For organizations having no back office, the USB embedded malware is used to infect the systems of the employees working there.

主站蜘蛛池模板: 固阳县| 武安市| 莱州市| 湖南省| 道孚县| 永康市| 黔南| 甘德县| 田林县| 三明市| 互助| 乐业县| 敖汉旗| 衡南县| 庄河市| 渝北区| 保定市| 东平县| 富平县| 清水河县| 南投县| 玛沁县| 绥江县| 缙云县| 饶平县| 鸡泽县| 松江区| 秭归县| 鄯善县| 阿瓦提县| 湛江市| 恩施市| 济阳县| 竹溪县| 偃师市| 治县。| 兴仁县| 开江县| 郧西县| 湘西| 东乡族自治县|