Learning Offense

Lockheed Martin kill chain

How to remember - RWD EICA

  1. Recon

  2. Weaponization

  3. Delivery

  4. Exploitation

  5. Installation

  6. C2

  7. Actions on objectives

Types of Persistence

Slow persistence

Long-haul persistence refers to techniques employed by attackers to maintain access to a compromised system over an extended period, often with the objective of establishing persistent control. It involves using stealthy and persistent mechanisms that survive system reboots and are difficult to detect. Examples of long-haul persistence techniques include:

  1. Rootkits: Malicious software that modifies the operating system to conceal its presence and provide ongoing access for the attacker.

  2. Backdoors: Unauthorized access points left behind by attackers to enable future entry into the compromised system.

  3. Malicious Services: Creating or modifying system services to execute malicious code automatically during system startup.

The primary focus of long haul persistence is to ensure long-term access and control without being easily detected or removed.

Payload Types

In the context of exploit development, a staged payload refers to a payload that is delivered in multiple stages. It involves breaking the payload into multiple parts or stages and delivering them separately to the target system. The initial stage often called the stager, is typically small and contains just enough code to establish communication with the attacker's server or exploit handler. Once the stager is executed on the target system, it establishes a connection back to the attacker's system and retrieves additional stages of the payload. The subsequent stages are then delivered and executed, allowing for more complex functionality.

The main advantage of using staged payloads is their smaller initial size, making them useful when there are limitations on payload size or when evading detection. Additionally, staged payloads can provide flexibility in terms of delivering different components of the payload at different times, allowing for dynamic updates or evasion techniques.

Staged payload is something you reach out to.

Delivered in multiple stages, with an initial small stager that establishes communication and retrieves additional stages from the attacker's system.

Malware

Average size is a few hundred kilobytes to a few megabytes

Last updated