Malware Development in C | Executing Shellcode using WinAPI

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ม.ค. 2025

ความคิดเห็น • 65

  • @fenilpatel6283
    @fenilpatel6283 2 ปีที่แล้ว +5

    Dayummm.. keep it on,
    sir... big fan always....

  • @ctcypher4577
    @ctcypher4577 2 ปีที่แล้ว +2

    Thank you man. full support from my side. please make more videos like this (creating advance malwares using C). and please make the font size bigger bcz i use magnify to watch you video 😂😂

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      Sorry about the font size issue, I did correct that mistake in the latest video 😁👍🏻

  • @k3nundrum
    @k3nundrum 2 ปีที่แล้ว +3

    good stuff @ActiveXSploit !!! Keep it up. Also... Options > Theme > DarkMode ftw ;)

  • @gianbattistavivolo7449
    @gianbattistavivolo7449 2 ปีที่แล้ว +2

    Thanks for the video... please keep making them, really useful content

  • @jamespatrick8145
    @jamespatrick8145 2 ปีที่แล้ว +2

    What an awesome video! Thank you!

  • @htpeof6943
    @htpeof6943 2 ปีที่แล้ว

    Amazing just what I was lookin 4!! Hope to learn more

  • @kismatkunwar4276
    @kismatkunwar4276 2 ปีที่แล้ว

    any tips for heuristics ?

  • @xmanrongngau5655
    @xmanrongngau5655 11 หลายเดือนก่อน

    Please, Help me! How do we set up the enviroment to run the shellcode in windows 10. I make this malware. But it doesn't work. I also create it in Flare-VM. But it also doesn't work.

  • @coresec8239
    @coresec8239 2 ปีที่แล้ว +2

    Thanks for another great tutorial.
    I have an issue: I compiled the source code successfully but if I start the executable, it didn't start notepad but I found in Event Viewer that the application has crashed. Do you have a recommendation, where to start to look for the beginning of this issue? (Env: Win 10 Enterprise, Visual Studio 2022)

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      Please check that if you are compiling code from a 64 bit compiler, you have to use a 64 bit shellcode, if you are compiling from a 32 bit compiler, use a 32 bit version of the shellcode

    • @coresec8239
      @coresec8239 2 ปีที่แล้ว

      @@ActiveXSploit Ah, let me check. I definitely used a 32 bit compiler on Kali but the shellcode is x64. I will keep you posted here.

    • @coresec8239
      @coresec8239 2 ปีที่แล้ว

      Okay, so I used VS2022 community edition to compile the source code (as you did: cl shellcode.c), notepad still not opening and the program dies (of course, it's enabled in Defender). Checking the Event Viewer messages, there is an error code 0x0000005 - access denied. The only thing that I could think about here is DEP - but I cannot add this program as an exception.

    • @coresec8239
      @coresec8239 2 ปีที่แล้ว

      Turned off DEP - the program still dies - possibly memory access violation.

    • @coresec8239
      @coresec8239 2 ปีที่แล้ว

      Finally: I used an adduser payload from msfvenom - it is platform independent on Windows - and successfully managed to get it running. NOTE for all readers: it works only if the shellcode is running as administrator (adding a user is an administrative task).

  • @hazed69
    @hazed69 2 ปีที่แล้ว

    Great stuff man

  • @Ryclic
    @Ryclic 2 ปีที่แล้ว

    nice videos! also, you sound a lot like hackersploit, I almost thought you were the same person haha

  • @michaelswahla4927
    @michaelswahla4927 2 ปีที่แล้ว

    hello, this might seem dumb to ask but does this work in c too (not just cpp)

  • @lakshmikumar9863
    @lakshmikumar9863 2 ปีที่แล้ว

    how can we run other payload exe like asyncrat etc using WinAPI?

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      You can use the ShellExecute Function call or the CreateProcess one

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      Yes, this i guess is the method for executing another PE inside your main PE program

  • @mdmahmudhasan1677
    @mdmahmudhasan1677 2 ปีที่แล้ว +4

    need a spyware in c

  • @f狗蛋
    @f狗蛋 2 ปีที่แล้ว

    Good job, can you share your vm environment files, thks!!!

  • @mukto2004
    @mukto2004 2 ปีที่แล้ว

    why we needed to sleep in the end ?

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      If we don't add a sleep function, the thread will not execute, try it on your own it won't work. It will execute but you won't see any results, the shellcode won't execute

  • @physics3641
    @physics3641 2 ปีที่แล้ว +1

    I can sense you are an indian bro, isn't it? Make continuous video on the channel. Your content is underrated. It's totally fabulous.

  • @JussPatel_
    @JussPatel_ 2 ปีที่แล้ว +2

    i sense a new mic ? 👀

  • @lololololol88888
    @lololololol88888 6 หลายเดือนก่อน

    roadmap for mal Dev????

    • @ActiveXSploit
      @ActiveXSploit  6 หลายเดือนก่อน +1

      I will be uploading a video on that soon, Stay tuned for further updates!

    • @lololololol88888
      @lololololol88888 6 หลายเดือนก่อน

      @@ActiveXSploit looking forward!

  • @anaels.w7382
    @anaels.w7382 2 ปีที่แล้ว

    great content man, thx for that. Just zoom in a little on edit my eyes are weak hahahah peace

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      Really sorry about the small size of the screen, i just forget it everytime but it won't happen the next time ;)

  • @kevinlaflamme7984
    @kevinlaflamme7984 2 ปีที่แล้ว

    is this HackerSploit ?

  • @fancy_bread5959
    @fancy_bread5959 ปีที่แล้ว

    thanks

  • @SecurityTalent
    @SecurityTalent 2 ปีที่แล้ว

    Great

  • @felipeolea8810
    @felipeolea8810 2 ปีที่แล้ว

    Plz dont stop making vids

    • @felipeolea8810
      @felipeolea8810 2 ปีที่แล้ว

      any malware course?

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว +1

      I'm sorry for not uploading videos, my final year exams are about to start, i have to focus on them.

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว +1

      Yes, there is a good course by Sektor7 team on malware development, Here is the link to it
      www.udemy.com/share/103xaK3@HTifBnsP4YhM8S4C_0Lyawbw4ux55qSfQIK0BnmMUcvm-X5ArRPOFchlVDYSbVdSJQ==/

    • @felipeolea8810
      @felipeolea8810 2 ปีที่แล้ว

      @@ActiveXSploit Thanks! I will take the course, if you know some more advance course let me know please! :)

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      Sektor7 has an advanced course, lookup for it on their site, you'll find it

  • @ricardoklement324
    @ricardoklement324 ปีที่แล้ว +1

    You are sound like Hackersploit, but with a lil bit indian accent

  • @androBughunter
    @androBughunter 2 ปีที่แล้ว

    danke

  • @BatBatov666
    @BatBatov666 ปีที่แล้ว

    I need microscope to see that tiny font

    • @ActiveXSploit
      @ActiveXSploit  ปีที่แล้ว

      I apologize for that mate, I've fixed the font size issue in the videos uploaded after this one

    • @BatBatov666
      @BatBatov666 ปีที่แล้ว

      Thnx,I will subscribe for appritiation@@ActiveXSploit

  • @skeletala
    @skeletala 2 ปีที่แล้ว

    have used syswhispers it"s a really cool way to hide api calls

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว +1

      You can also hide the API Calls by GetProcAddress and GetModuleHandle too. Just get a handle to the kernel32.dll and import the functions which you want, tho, the API Call name would get detected if the analyst runs strings on the binary, for that you could use some string encryption to hide the API Call string

    • @skeletala
      @skeletala 2 ปีที่แล้ว

      @@ActiveXSploit cool, i"ve never thought of this. but does it evade windows defender?

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      I believe it will, it should pass the static analysis phase, tho the malware should get detected in the behavioural analysis phase

    • @skeletala
      @skeletala 2 ปีที่แล้ว

      @@ActiveXSploit I though so, since you need a way to remove or evade the defnder API hooking.

    • @ActiveXSploit
      @ActiveXSploit  2 ปีที่แล้ว

      I didn’t knew of that but yeah I try it in my way mentioned above and it does work