Basic Linux Memory Forensics - Dumping Memory and Files with DD - Analyzing Metttle/Meterpreter

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 มิ.ย. 2024
  • 00:00 - Intro
    00:47 - Discovering a weird binary running in /tmp/ but it doesn't exist on disk
    01:55 - Start of explaining dd copying things out of memory
    02:30 - Reading maps to identify where the file is, showing how to covnert hex to decimal in bash
    04:00 - File extracted from memory
    05:15 - Copying the heap from memory and discovering it is mettle/meterpreter based upon strings
    06:55 - Showing we don't need to use DD to extract the file, can just use the "exe" file in proc/pid/
    09:15 - Opening the elf in Ghidra and examining its decompiled output
    12:00 - Showing what the file looks like in Cutter, which has a different decompile view
    13:40 - Reading the Metasploit source code to identify what it looked like, to confirm what our findings from reversing
    16:00 - Using MSFVenom to generate our own stager in order to confirm this is indeed what we saw on the box and that we extracted it correctly
    18:50 - Using GDB against the stager to just practice reversing

ความคิดเห็น • 36

  • @obfusec8329
    @obfusec8329 2 ปีที่แล้ว +32

    I feel like we've been getting more uploads than usual from you and its great! It's crazy to think I've learned much of what I know about offensive security from your videos. Now I'm OSCP certified and working towards OSWE and OSED. Can't thank you enough for the content!

    • @hubertgruber2341
      @hubertgruber2341 2 ปีที่แล้ว

      can you describe how your work looked like? I mean, were you spending some time on htb before oscp course, how much time do you spend on python etc?

  • @devnull8769
    @devnull8769 2 ปีที่แล้ว +13

    Awesome explanation like always. I‘d love to see a deep-dive assembly with reversing malware from you.
    Keep things up ipp!

  • @henrik.johnsen
    @henrik.johnsen ปีที่แล้ว

    This was super informative, with quick and spot on explanations without any unnecessary «fill» content👍🏼👍🏼👍🏼

  • @chiragartani
    @chiragartani 2 ปีที่แล้ว +3

    I was just reading your reply on Liveoverflow's comment about not going technical. By the way Happy April Fool.☺️
    Watching the video now..

  • @takeshikovacs1081
    @takeshikovacs1081 2 ปีที่แล้ว +1

    the way you explain things is truly amazing ! can't get enough of your content

  • @emilsrbrden2987
    @emilsrbrden2987 2 ปีที่แล้ว

    Awesome to see some new content from you my man! Please keep it up, much appreciated!

  • @gokul6120
    @gokul6120 2 ปีที่แล้ว +1

    Thanks for that . Please continue with this type of content !! ❤️❤️

  • @amirmoti8494
    @amirmoti8494 2 ปีที่แล้ว +1

    Thank you ippsec, you are the best. Keep uploads videos that can teach us

  • @saurabhshinde1855
    @saurabhshinde1855 2 ปีที่แล้ว +1

    As always, just awesome content.

  • @MattKAva
    @MattKAva 2 ปีที่แล้ว +1

    This was great, love it!

  • @oldprogrammer93
    @oldprogrammer93 2 ปีที่แล้ว +1

    It's really very interesting, thank you IppSec.

  • @valeryivanov7756
    @valeryivanov7756 2 ปีที่แล้ว +1

    Amazing!
    Thank you!

  • @cryptolivebot7163
    @cryptolivebot7163 2 ปีที่แล้ว

    great explanation

  • @mrd7901
    @mrd7901 2 ปีที่แล้ว

    It's reminds me "Mr robot".
    You always gem 💎❤️

  • @fabiorj2008
    @fabiorj2008 2 ปีที่แล้ว

    Awesome video.

  • @defyteryt2452
    @defyteryt2452 2 ปีที่แล้ว

    Good job we enjoying your vedio

  • @MikaCybertron
    @MikaCybertron ปีที่แล้ว

    hi sir why when i dumping memory and files always just get dump file with size 1 MB to 1.5 MB, but the original size file is more than 15 MB, do you know how to fix it sir?
    here is my command:
    dd if=/proc/pid/mem of=/temp/dump bs=1 count=dumpSize skip=StartAddress

  • @RandyFortier
    @RandyFortier 2 ปีที่แล้ว +1

    Ports are 16 bits, and 4433 decimal works out to 1151. As x86 uses little endian, this will show up as 5111. So, the dword that you found was, in fact, the port for sys_socketcall().

  • @woolliedev
    @woolliedev 2 ปีที่แล้ว +1

    Nice!

  • @x.plorer
    @x.plorer 2 ปีที่แล้ว +1

    Thanks

  • @Ms.Robot.
    @Ms.Robot. 2 ปีที่แล้ว

    Ohhh nicceee ❤️

  • @cimihan4816
    @cimihan4816 2 ปีที่แล้ว +3

    Hello, ippsec can you provide me the flag that you used to reduce go file size while compiling ?

    • @ippsec
      @ippsec  2 ปีที่แล้ว +4

      Just search Ippsec.rocks for “shrink go”

  • @robbie2044
    @robbie2044 2 ปีที่แล้ว

    That was very nice forensics. From the video I gathered it was a 'malicious actor'? Maybe I am wrong and someone just left it there, didn't watch the stream :(
    I am wondering though, what generally happens to people who put malware like this on certain HTB machines? Because I know you can track the IP to the account. I am asking because this might not be only scenario. Like what happens to people who actively try to hack another user. Not an "accident" or a bump during live machines.

  • @nicof_2000
    @nicof_2000 ปีที่แล้ว

    4:00 ELF is a windows executeable? I thought ELF is for unix based systems and PE is the windows executable format?

  • @zakcheb6086
    @zakcheb6086 2 ปีที่แล้ว

    Hey ipp,
    For 21:18 part, the port and AF_INET are both taking 2 bytes:
    The port is echo $((0x5111)) => 20753 and AF_INET=2 , you can check it in 14:47.
    Awesome content as always, thanks alot for it, we learn everyday from you =)

    • @seppmeier9961
      @seppmeier9961 2 ปีที่แล้ว +1

      crap you were 3minutes faster (watch out for network byte order/bigendian: the port is 4433 decimal)

    • @ippsec
      @ippsec  2 ปีที่แล้ว

      Thanks!

  • @S2eedGH
    @S2eedGH 2 ปีที่แล้ว

    So it is running even after removing the executable ? what about after rebooting a system, will still be working ?

    • @secinject814
      @secinject814 ปีที่แล้ว

      Good question. Crazy that a malware could run after being deleted

  • @Fidelity_Investments
    @Fidelity_Investments ปีที่แล้ว

    What gdb config is that? Mine is seemingly boring compared to yours :(

  • @luffy20250
    @luffy20250 2 ปีที่แล้ว

    Brother, please make a video on how to install dvwa on ubuntu

  • @itsmijail
    @itsmijail 2 ปีที่แล้ว

    Who else likes how he uses legend of zelda related names in some of his VMs?

  • @sotecluxan4221
    @sotecluxan4221 2 ปีที่แล้ว

  • @sieteLineas
    @sieteLineas 2 ปีที่แล้ว

    wow