Back To Schedule
Wednesday, March 11 • 4:00pm - 4:50pm
DOT NET Advanced Malware Development Live off the rich fertile land, and profit

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
In the age of machine learning enabled Endpoint Defense and Response solutions, and increasing usage of application whitelisting, Penetration Testers have been forced into creating new methods of delivering malware for initial command channel access and more. The Microsoft DOT NET Framework has been an enormous advance for developers with a rich API, and powerful C#, and other DOT NET programming languages.  Modern Windows operating systems must have the DOT NET framework installed for many normal operations making the DOT NET framework an attractive target for penetration testers, and attackers alike.

This talk will walk through how a penetration tester can use the C# language to develop a DOT NET assembly (DLL) designed to deliver shellcode into memory on a Windows system.  The talk will cover aspects of the necessary API calls into kernel32.dll, and describe how to build an MSBUILD XML file in order to evade whitelisting solutions.  Attendees of the talk should preferably have some familiarity with the C# programming language.  Techniques mentioned will include shellcode residing in the same thread, versus injecting into a remote process.

avatar for Joff Thyer

Joff Thyer

Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer... Read More →