Black-Hat-Zig
Remote thread enumeration
Initializing search
CX330Blake/Black-Hat-Zig
Get Started
Payload Management
Malware Techniques
Malware Examples
Epilogue
Black-Hat-Zig
CX330Blake/Black-Hat-Zig
Get Started
Get Started
Intro to Black-Hat-Zig
Before We Start
Payload Management
Payload Management
Payload Placement
Payload Placement
.data Section
.rdata Section
.text Section
.rsrc Section
Payload Obfuscation
Payload Obfuscation
IP Address Obfuscation
MAC Address Obfuscation
UUID Obfuscation
Payload Encryption
Payload Encryption
XOR Encryption
RC4 Encryption
AES Encryption
Payload Execution
Payload Execution
Execute Via DLL
Execute Via Shellcode
Malware Techniques
Malware Techniques
Payload Staging
Payload Staging
Using Web Server
Using Windows Registry
Process Enumeration
Process Enumeration
Using CreateToolhelp32Snapshot
Using EnumProcesses
Using NtQuerySystemInformation
Process Injection
Process Injection
DLL Injection
Shellcode Injection
Thread Hijacking
Thread Hijacking
Local Thread Creation
Local Thread Enumeration
Remote Thread Creation
Remote thread enumeration
Malware Examples
Malware Examples
Reverse Shell
Reverse Shell
Classic Reverse Shell
Reverse Shell With TLS
Epilogue
Remote thread enumeration
Back to top