IronPython... OMFG - Marcello Salvati - Hack in Paris - 2019
Offered By: Hack in Paris via YouTube
Course Description
Overview
Explore an innovative approach to offensive cybersecurity operations using IronPython in this 49-minute conference talk from Hack in Paris. Discover how to gain dynamic access to the .NET runtime without relying on PowerShell, bypassing recent Microsoft protections. Learn about the progression from initial concept to building a full Implant/C2 framework, covering topics such as .NET assemblies, managed and unmanaged code, interoperability, and the advantages of using IronPython. Gain insights into the development of SILENTTRINITY, an implant/C2 framework implementing this research, and understand potential defenses and countermeasures. Delve into the future of offensive tradecraft and adapt to evolving cybersecurity landscapes.
Syllabus
Intro
Agenda
PowerShell
Dotnet
Dotnet Assembly
Managed Unmanaged Code
Dotnet Languages
Assembly That Load
Interoperability
Why CSharp
PowerShell in CSharp
Common problems
Required assemblies
IronPython
Demo
BooLang
ClearScript
Advantages
Other languages
Django
To v20
Defenses
CounterStep
Biggest Giveaway
Long Term Goal
Taught by
Hack in Paris
Related Courses
NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in ParisHack in Paris via YouTube All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Hack in Paris via YouTube In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube