Windows APT Warfare Identify and prevent Windows APT attacks effectively
by Sheng-Hao Ma
Packt Publishing 2023
ISBN 978-1-80461-811-0
https://github.com/PacktPublishing/Windows-APT-Warfare https://www.packtpub.com/en-us/product/windows-apt-warfare-9781804618110
Page | Remark |
---|---|
xiv | TDM-GCC |
4 | subsystem |
calling conventions for C, C++ | |
5 | MinGW |
Application Binary Interface (ABI) | |
“Argument Passing and Naming Conventions” - Microsoft | |
MessageBoxA | |
6 | Assembler - transforming assembly to machine code |
7 | x86 instruction set |
8 | Common Object File Format (COFF) |
object file | |
9 | linker |
“How to write endian-independent code in C” - IBM | |
10 | application loader |
Data Execution Prevention (DEP) | |
12 | process hatching process |
13 | file mapping |
14 | DOS Header |
IMAGE_DOS_HEADER | |
IMAGE_DOS_SIGNATURE | |
NT Header | |
PE structure | |
.signature field | |
17 | File Header IMAGE_FILE_HEADER |
Optional Header | |
19 | Section Header IMAGE_SECTION_HEADER |
section headers array | |
21 | PE parsing |
24 | PE infection |
PE patcher | |
27 | msfencode |
29 | tinyLinker |
31 | IMAGE_SUBSYSTEM_WINDOWS_CUI |
IMAGE_SUBSYSTEM_WINDOWS_GUI | |
32 | Process Hollowing |
RunPE | |
38 | PE2HTML |
important and indestructable fields in PE files | |
“Hacking the world with HTML” | |
42 | function calling convention |
43 | calling convention |
45 | Thread Environment Block (TEB) |
46 | Structured Exception Handling (SEH) |
multi-thread | |
47 | Process Environment Block |
48 | UNICODE_STRING |
RTL_USER_PROCESS_PARAMETERS | |
49 | PEB_LDR_DATA |
LIST_ENTRY | |
LDR_DATA_TABLE_ENTRY | |
53 | Process Parameter Forgery |
vssadmin delete shadows /all /quit | |
54 | Process Monitor |
55 | masquerade cmdline |
“Antivirus Bypass Techniques: Learn practical techniques and tactics to ombat, bypass, and evade antivirus software” - Nir Yehoshua | |
enumerating loaded modules without an API | |
ldrParser.c | |
56 | flink |