WinAPI is EASY | Embedding Shellcode in .text, .data, and .rsrc

Поділитися
Вставка
  • Опубліковано 1 жов 2024
  • Hey Hackers!
    MalwareDNA: github.com/Cos...
    I hope you enjoyed the video. If you have any questions make sure to leave them in a comment down below. You can also contact me through my website on the "Contact and Information" page or on my discord server.
    Want to support CCS?:
    Happy Hacker: cosmodiumcs.co...
    GoFundMe: www.gofundme.c...
    Socials:
    Website: cosmodiumcs.com
    Instagram: / cosmodium.cs
    GitHub: github.com/Cos...
    Discord: / discord
    Make sure to like and subscribe!
    Happy Hacking!

КОМЕНТАРІ • 44

  • @Duckiling
    @Duckiling Рік тому +2

    As one wise man once said: "YEEAAA BABY, THATS WHAT I HAVE BEEN WAITING FOR, THAT IS WHAT ITS ALL ABOUT, WHOOOOOO"

  • @bitcloud7732
    @bitcloud7732 8 місяців тому +1

    First of all, thank you so much for this playlist there's so many paid courses n stuff online but it's great to see that you are doing this for free (Gigachad move).
    There is one crucial problem I want to point out. As of now (28 January 2024) if you launch vscode from the native tools command prompt and then compile your malware, it will compile without any errors and execute the shellcode but the shellcode will not open up notepad or do the action it is intended to perform. For it to work, you need to launch vscode by using the Developer command prompt. Open the developer command prompt for vscode and then run the command `code` to open vscode. Now when you execute your malware, the shellcode will run properly.
    I compiled the same malware using the native tools cmd like 2 months ago and everything was working fine. But now, suddenly it decided to stop working so yeah, after pulling my hair out for like 4 hours, I figured out that the developer command prompt for vscode is the solution. Thanks!

    • @CosmodiumCS
      @CosmodiumCS  7 місяців тому

      Dude!!! Thanks for bringing this to my attention (and all the kind words 🫶🏽). I’ll be sure to put a notice out

  • @chogpamp
    @chogpamp Рік тому +2

    Fiinnalllyyyyyy another cosmodium video, i love the content keep up the good work 💯🔥🔥

  • @megacryptertuto9701
    @megacryptertuto9701 11 місяців тому

    am CyberSecurity 😆

  • @laurentiumocacoca175
    @laurentiumocacoca175 2 місяці тому

    So basically the whole idea to embed shellcode is to allocate memory, load it without raising any red flags(RW only), change the rights to EW and make a thread. Is this the whole concept of shellcode on repeat? What do I mean by that? Is this is the whole idea of working with WinAPI and Shellcode? Great video btw!

    • @CosmodiumCS
      @CosmodiumCS  2 місяці тому

      Hey! I’m unsure on what u mean by “repeat”, but the program will wait for the thread (basically a task being ran by the process) to finish executing.

    • @laurentiumocacoca175
      @laurentiumocacoca175 2 місяці тому

      @@CosmodiumCS by ''on repeat'', I mean that this is how you should embed shellcode? Is this the only way to do it or there are any other approaches?

  • @scriptkiddie999
    @scriptkiddie999 Рік тому +1

    a fan here. Thank you so much for putting this video together!

  • @ThreatHunter-c8b
    @ThreatHunter-c8b 3 місяці тому

    ur using gigachad c++ command lines to not using vscode 2022 to do it for ya linux is the best distro I love it man its really great good practice cuz u understand what happen under the hood instead of just clicking buttons example when u create obj file and then link it into executable that let u understand the compilation process how c++ file turn into .exe file really thank u

    • @CosmodiumCS
      @CosmodiumCS  3 місяці тому

      lmfaoo! i appreciate the sentiment.

    • @ThreatHunter-c8b
      @ThreatHunter-c8b 3 місяці тому

      @@CosmodiumCS i do the same :
      # create rc file using:
      - new-item filename.rc
      - #define id of resource : #define SC_ICON 1337
      - link file of the resource : SC_ICON RCDATA "notpad.ico"
      - import SC_ICON into ur malware file
      # initalisation of rc using :
      - rc filename.rc (should creat filename.res)
      # convert resource to object file:
      - cvtres /MACHINE:X64 /OUT:filename.o .\filename.res
      # compile it:
      - cl.exe /nologo /GS- /DNDEBUG /Tpsection_rsrc.cpp /link /OUT:section_rsrc.exe /SUBSYSTEM:CONSOLE /MACHINE:X86 rsrc.o
      - note that lp for c++ and lc for c : /Tpsection_rsrc.cpp

  • @mohitkwatra118
    @mohitkwatra118 4 місяці тому

    THIS IS AWESOME 🎭

  • @CharonFive-ud5bo
    @CharonFive-ud5bo Рік тому

    Any have any social media account like facebook whatsapp hacking tools. And not phishing

  • @ZacLangston
    @ZacLangston Рік тому +1

    Is this a long video or a short movie? I can't wait to give this a watch.

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +2

      lmfaoo, trust me, you’ll enjoy it! Its prolly one of the best ways to learn winapi‼️‼️

  • @aragorn43036
    @aragorn43036 Рік тому

    Error Memory Access Violation 😞, how to fix?

  • @Keidieisskxlq
    @Keidieisskxlq 9 місяців тому

    Whats your vscode theme name? :D

    • @CosmodiumCS
      @CosmodiumCS  9 місяців тому

      It’s like..Dark Ocean or something like that lmfao😆🤷🏽‍♂️

  • @ytg6663
    @ytg6663 Рік тому

    Use this tutorial and get Caught 🤣🤣🤣🤣🤣

  • @jibhax2119
    @jibhax2119 10 місяців тому

    Such a great video, keep it up.
    I have one question, how did you build the exe file , i mean as x86 or 64 .Cz i am trying to buid in microsoft visual studio and successfully built but is't working.Alos the windows sdk version you used compiling it. Please.

    • @mohitkwatra118
      @mohitkwatra118 4 місяці тому

      Hi, Initially the same happened with me, I was able to compile it, but the shellcode didn't execute. Actually shellcode and executable both were not 32 bit, so while compiling I specified an option /arch:IA32 to compile into 32 bit executable and it worked perfectly. I hope it helps.

  • @oguzhanghostproductions3985
    @oguzhanghostproductions3985 4 місяці тому

    I've discovered this channel today and I have found it very nice with a lot of topics covered. I am actually a beginner in malware development and your videos are useful for people like me who want to learn about coding malwares thank you a lot!

  • @urits3719
    @urits3719 Рік тому

    Why did you use "RtlMoveMemory" instead of "WriteProcessMemory"?
    just out of curiosity

    • @CosmodiumCS
      @CosmodiumCS  Рік тому +1

      Im lazy, has less arguments😂. Jokes aside, I figured its better for beginners who are just starting with the winapi

  • @DataKG-os2zo
    @DataKG-os2zo 4 місяці тому

    As a beginner in this field, your explanation is the best, thank you.

  • @MrMKA2012
    @MrMKA2012 Рік тому

    TY

  • @uni4on
    @uni4on Рік тому

    🤯

  • @anhla4265
    @anhla4265 Рік тому

    Awsomeee thanks you so muchhh

  • @JuanFelix-
    @JuanFelix- Рік тому

    u are a genius bro I follow u 💥

  • @sysgerm
    @sysgerm Рік тому

    Insane!

  • @cdcdplayer
    @cdcdplayer 8 місяців тому

    Bro you’re an absolute legend.

  • @nanthagopalj314
    @nanthagopalj314 10 місяців тому

    I fukin love this video

  • @Echownz
    @Echownz Рік тому

    Great Tut

  • @GreatTS
    @GreatTS Рік тому

    You are literally great teacher. Its been 11 pm and I was about to go to sleep but here I am watching your videos with full enjoyment and enhancing my skills. Please keep up with these nice contents. Love from Nepal. (Wait what's the shortcut for emojis in PC 😭😭😭😭)

    • @CosmodiumCS
      @CosmodiumCS  Рік тому

      Hahaha! Thanks so much, really happy to hear you’re getting a lot from it :D