• XSS.stack #1 – первый литературный журнал от юзеров форума

how to use Netwire Rat C/++ ARRAY

В этой теме можно использовать автоматический гарант!

intotheblues1

RAID-массив
Забанен
Регистрация
04.08.2021
Сообщения
62
Реакции
3
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello i saw someone who generate a C / C ++ array from netwire then somehow he build a dll through it and injects it in a legitimate executable by dll injection, can someone guide me please how to use that C / C ++ array from netwire into a dll then executable, i would really appreciate the help and even willing to pay for someone to teach me please as i dont have much knowledge
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Basically the netwire binary was converted into shellcode and the shellcode was converted into DLL for execution using DLL injection.

Search on github - Shellcode Reflective DLL Injection ;)
exactly bro and i have seen a guy do that and it perfectly bypass AV's . but since i am no programmer i'm having a hard time doing that
 
Hello i saw someone who generate a C / C ++ array from netwire then somehow he build a dll through it and injects it in a legitimate executable by dll injection, can someone guide me please how to use that C / C ++ array from netwire into a dll then executable, i would really appreciate the help and even willing to pay for someone to teach me please as i dont have much knowledge
Check this —> https://github.com/monoxgas/sRDI
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован
i will see to make a video for you if i have spare time.
 
https://github.com/monoxgas/sRDI is for PE DLL files.. it wont load PE executables. To load executable files .. one needs to code a reflective loader for loading PE exe and reflective loader for DLL wont work , sRDI is reflective loader for dll..
Reflective Loader for DLL loads the dll by parsing PE headers and loading appropriate exported function.
Reflective Loader for exe loads an exe by parsing PE headers and finally loads entry point of the executable.
PS: netwires payload [byte array] binary is PE exe
 
Пожалуйста, обратите внимание, что пользователь заблокирован


Напишите ответ...
Верх