Transcript
A (0:03)
Hello from Spearfish, South Dakota. It's the Black Hills Information Security Podcast. This is the podcast version of our webcast, so some of the slides we might reference will be missing, but you can find the whole episode on our YouTube page. This is Endpoint Security. Got yout Down. No PowerShell. No problem with Marcelo Salvati. Enjoy.
A (0:29)
Alrighty. Well, thank you everyone for joining. Again, we're going to be talking about a somewhat new Red Team technique. The reason why I say somewhat is because I have a really, I don't like saying new because I'm pretty sure that if I think of it, a lot of other people have thought of it. And also it really isn't a completely new red teaming technique because we've sort of been doing a version of what I will be describing, whether you realize it or not, in like a lot of tools that we've, we've all been using as red teamers and pen testers for quite a while. This is more of like a spin on an old technique. My spin on an old technique should be interesting. This is our agenda for today. We're going to be covering some key. NET Framework concepts. The reason why is because we all have to get on the same page and to completely understand how this is even possible, we all have to know some key framework concepts. Also, I feel like just talking to pen testers and red teamers up, there's somewhat a little bit of a confusion regarding some of the. NET Framework terms that have been thrown around recently with all the C Sharp tooling coming about. So I feel like it'd be a good refresher for everybody. Just prefacing that I am going to be saying NET Framework assembly and NET a lot throughout this webinar. Just bear with me here. After that we're going to be talking about how to embed interpreter engines, technical details on how to do that. There will be some code and then we're going to be covering some key differences between BYY payloads. So bring your own interpreter payloads versus traditional C payloads. Byoi, by the way, is the thing that I just came up with. Don't be surprised if you haven't heard of that anywhere. Then we're going to be talking about the new sound Trinity updates. The soundtrainity is the tool that I wrote. It's like a post exploitation tool that tries to weaponize some of the BYOI concepts. It's been around since last derbycon, but it was essentially beerware. It was like in a POC stage. So with the new update it brings it From Beerware to Alpha, which is a big jump. Then we're going to be doing a demo and we're going to be talking about some detection mechanisms and then we're going to be going with the Q and A. First things first, we got to understand what is a. NET assembly, because I feel like a lot of people have heard this term been thrown around a lot and not actually understood what it is. All you really need to know is that a. NET assembly is a blob of precompiled code that any. NET language can interpret and execute. That's a very high level description of what that actually is. We're not going to be getting into the details of the. NET assembly format just because that's not for the sake of this webcast. That will take way too long. But all you really need to know is that any. NET language can interpret and execute any. NET assembly. How do you go about generating a. NET assembly? Well, it's pretty easy actually. You take any. NET language. We're going to take C in this case and you compile it into an executable using Visual Studio or cse. Exe, which is the built in compiler for C. You compile C into a. Exe.
![BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem. - Talkin' Bout [Infosec] News cover](/_next/image?url=https%3A%2F%2Fimg.transistor.fm%2FAukI425sRBc3M3UIa9lVng7qjeNeYEQ8BZfzCEXhALs%2Frs%3Afill%3A0%3A0%3A1%2Fw%3A1400%2Fh%3A1400%2Fq%3A60%2Fmb%3A500000%2FaHR0cHM6Ly9pbWct%2FdXBsb2FkLXByb2R1%2FY3Rpb24udHJhbnNp%2Fc3Rvci5mbS8xZTA1%2FZWZhNDcxZGM4ZTFj%2FZGJhMTMwNmYzMmJj%2FZjBkNi5wbmc.jpg&w=1920&q=75)