Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Windows APT Warfare
  • Table Of Contents Toc
Windows APT Warfare

Windows APT Warfare

By : Sheng-Hao Ma
5 (5)
close
close
Windows APT Warfare

Windows APT Warfare

5 (5)
By: Sheng-Hao Ma

Overview of this book

An Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive information. Preventing APTs requires a strong foundation of basic security techniques combined with effective security monitoring. This book will help you gain a red team perspective on exploiting system design and master techniques to prevent APT attacks. Once you’ve understood the internal design of operating systems, you’ll be ready to get hands-on with red team attacks and, further, learn how to create and compile C source code into an EXE program file. Throughout this book, you’ll explore the inner workings of how Windows systems run and how attackers abuse this knowledge to bypass antivirus products and protection. As you advance, you’ll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware. By the end of this book, you’ll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks.
Table of Contents (17 chapters)
close
close
1
Part 1 – Modern Windows Compiler
5
Part 2 – Windows Process Internals
9
Part 3 – Abuse System Design and Red Team Tips

tinyLoader example

The following example is the peLoader.cpp source code under the Chapter#6 folder of the GitHub project. In order to save space, this book only extracts the highlighted code; please refer to the complete source code see all the details of the project.

We first compile our msgbox.c source code as we did in Chapter 1 with MinGW and use the -Wl,--dynamicbase,--export-all-symbols arguments to generate an EXE file with a relocation table, msgbox_reloc.exe, as shown in Figure 6.3:

Figure 6.3 – The generation of msgbox_reloc.exe

Figure 6.3 – The generation of msgbox_reloc.exe

Figure 6.4 shows the fixReloc function responsible for correcting the relocation task for the entire PE module:

Figure 6.4 – The fixReloc function

Figure 6.4 – The fixReloc function

At lines 56-57 of the code, we can retrieve the starting point of the relocation table held in the current .reloc section from DataDirectory[IMAGE_BASE_RELOCATION] and later use it to analyze the relocation fields.

At lines...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Windows APT Warfare
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon