As I said before, there are a lot of lessons for payload authors here.

- Don't include the real payload (stage 2) in everyone infected, only in those who are exploited. Infection (stage 1) should just enable delivery.

- Always encrypt and sign your payloads, both for confidentiallity and to make sure others can't use your backdoor.

- Make sure captured payloads can not be replayed against everyone

- Don't phone home

- Make sure your stack is aligned!

- Stash your stage 1 in files that evade scrutiny (a unit test case file was good, but now that's been burned and people will be looking closer at those, at least for a while)

- If you do put a payload in a unit test, be sure to write a test that uses said file, and add some chaff so it's not immediately obvious that it's an obfuscated shell script

nostr:nevent1qqswwywsvu3ufcy9syvs9k26a3un970gdgldc3s8fp6445nr9ewz2kgpz3mhxue69uhhyetvv9ujumn0wd68ytnzvupzp5cw4x82vh5487g6hylkkv82284n83gxlp75nasq5yu6auq249g3qvzqqqqqqyah7gv6

Reply to this note

Please Login to reply.

Discussion

No replies yet.