Nell’ultimo decennio l’industria del cloud computing è stata interessata da una crescita esponenziale. Secondo Exploding Topics, dal 2015 ad oggi la quantità di dati aziendali gestiti e mantenuti in cloud è raddoppiata, fino a raggiungere circa il 60% della totalità delle informazioni corporate. In particolare, circa il 22% del mercato cloud appartiene a Microsoft Azure, …
In the previous blog post we have seen how to perform a shellcode process injection by finding a target process PID using several WinAPIs, in that case all the WinAPIs were called directly. Usually malwares resolve the WinAPI address at runtime in order to hide malicious behaviours during static analysis. In this blog post we …
In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: OpenProcess used to open a handle to the target process, then the VirtualAllocEx was used to allocate a new readable and writable region of memory into the target process, …
Introduction Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custom malwares to perform various tasks based on the specific situation. At the same time, analyzing Malwares is useful to learn how malwares work and how to detect them, in order to defend our …