YoVDO

IronPython... OMFG - Marcello Salvati - Hack in Paris - 2019

Offered By: Hack in Paris via YouTube

Tags

Hack in Paris Courses Django Courses PowerShell Courses Offensive Security Courses

Course Description

Overview

Explore an innovative approach to offensive cybersecurity operations using IronPython in this 49-minute conference talk from Hack in Paris. Discover how to gain dynamic access to the .NET runtime without relying on PowerShell, bypassing recent Microsoft protections. Learn about the progression from initial concept to building a full Implant/C2 framework, covering topics such as .NET assemblies, managed and unmanaged code, interoperability, and the advantages of using IronPython. Gain insights into the development of SILENTTRINITY, an implant/C2 framework implementing this research, and understand potential defenses and countermeasures. Delve into the future of offensive tradecraft and adapt to evolving cybersecurity landscapes.

Syllabus

Intro
Agenda
PowerShell
Dotnet
Dotnet Assembly
Managed Unmanaged Code
Dotnet Languages
Assembly That Load
Interoperability
Why CSharp
PowerShell in CSharp
Common problems
Required assemblies
IronPython
Demo
BooLang
ClearScript
Advantages
Other languages
Django
To v20
Defenses
CounterStep
Biggest Giveaway
Long Term Goal


Taught by

Hack in Paris

Related Courses

NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in Paris
Hack in Paris via YouTube
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube
Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube
All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Hack in Paris via YouTube
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube