UNDERCODE TESTING
bypass_ai_detections.pdf
Using this method, there is no need to rewrite the article in humanised AI.
๐ฆElliptic Curve Cryptography (ECC) Encryption and decryption.:
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
>> Write the main function for operation
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
// #![allow(deprecated)]
pub use k256::{elliptic_curve::{sec1::FromEncodedPoint, AffinePoint, Field}, EncodedPoint, ProjectivePoint, Scalar, Secp256k1};
pub use sha2::{Digest, Sha256};
pub use rand::rngs::OsRng;
pub use k256::elliptic_curve::group::GroupEncoding;
pub use k256::ecdsa::VerifyingKey;
fn encode_shellcode(
shellcode: &[u8],
public_key: &AffinePoint<Secp256k1>,
) -> (EncodedPoint, Vec<u8>) {
let mut rng = OsRng;
// generate the ephemeral keypair
let k = Scalar::random(&mut rng);
let r = (ProjectivePoint::generator() * k).to_affine();
// compute shared secret
let shared_secret = *public_key * k;
let shared_secret_bytes = shared_secret.to_bytes();
// derive encryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let encryption_key = hasher.finalize();
// Encrypt shellcode
let encrypted_shellcode: Vec<u8> = shellcode
.iter()
.zip(encryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect();
(EncodedPoint::from(&r), encrypted_shellcode)
}
fn decode_shellcode(
encrypted_shellcode: &[u8],
r: &EncodedPoint,
private_key: &Scalar,
) -> Vec<u8> {
// Compute shared secret
let r_point = ProjectivePoint::from_encoded_point(r).expect("Invalid R point");
let shared_secret = r_point * private_key;
let shared_secret_bytes = shared_secret.to_bytes();
// derive decryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let decryption_key = hasher.finalize();
// Decrypt shellcode
encrypted_shellcode
.iter()
.zip(decryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect()
}
>> Write the main function for operation
fn main() {
// Example string => lets name it as shellcode ie (placeholder)
let shellcode: &[u8] = b;"Hello, World!"
// Generate ECC key pair
let private_key = Scalar::random(&mut OsRng);
let public_key = (ProjectivePoint::generator() * private_key).to_affine();
println!("Private Key: {:?}", private_key);
println!("Public Key: {:?}", public_key);
// Convert AffinePoint to VerifyingKey (or PublicKey)
VerifyingKey::from_encoded_point(&EncodedPoint::from(public_key))
.expect("Invalid public key");
let (r, encrypted_shellcode) = encode_shellcode(shellcode, &public_key);
println!("Encrypted Shellcode: {:?}", encrypted_shellcode);
// Decode the shellcode
let decrypted_shellcode = decode_shellcode(&encrypted_shellcode, &r, &private_key);
println!(
"Decrypted Shellcode: {:?}",
Ref: github by Kavinarasu I
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ10 awesome GitHub repos to learn and practice API Security
1. awesome-api-security
- https://lnkd.in/gKSX8Sj8
2. 30-API-security-tests
- https://lnkd.in/g-JShXbi
3. API-Security-Checklist
- https://lnkd.in/gdfGV6ev
4. api-security-study-plan
- https://lnkd.in/gkfrAnpK
5. API-Pentesting-Checklist
- https://lnkd.in/gx6Q549z
6. API-Security-Checklist
- https://lnkd.in/gKVUpzWe
7. API-SecurityEmpire
- https://lnkd.in/gZEkf2wB
8. 31-days-of-API-Security-Tips
- https://lnkd.in/g8SCiVAZ
9. APISecurityBestPractices
- https://lnkd.in/gBDWSBvK
10. apisecurityinaction
- https://lnkd.in/gUxJ8HCy
Ref: Ankita Gupta
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. awesome-api-security
- https://lnkd.in/gKSX8Sj8
2. 30-API-security-tests
- https://lnkd.in/g-JShXbi
3. API-Security-Checklist
- https://lnkd.in/gdfGV6ev
4. api-security-study-plan
- https://lnkd.in/gkfrAnpK
5. API-Pentesting-Checklist
- https://lnkd.in/gx6Q549z
6. API-Security-Checklist
- https://lnkd.in/gKVUpzWe
7. API-SecurityEmpire
- https://lnkd.in/gZEkf2wB
8. 31-days-of-API-Security-Tips
- https://lnkd.in/g8SCiVAZ
9. APISecurityBestPractices
- https://lnkd.in/gBDWSBvK
10. apisecurityinaction
- https://lnkd.in/gUxJ8HCy
Ref: Ankita Gupta
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ100 New Cybersecurity projects ranging from beginner to advanced level. This can be used for a portfolio, personal website, or resume.
ref: RUPESH KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
ref: RUPESH KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆIn Active Directory Domain Services (ADDS), you can enforce Group Policy updates across all computers in your domain using the following command:
#security #tips
This ensures that any recent changes to Group Policies are applied immediately, enhancing security and compliance.
Ref: Milandeep kaur S.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
#security #tips
gpupdate /force
This ensures that any recent changes to Group Policies are applied immediately, enhancing security and compliance.
Ref: Milandeep kaur S.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNew AI Jailbreak Meth:
Suicide Bot: New AI Attack Causes LLM to Provide Potential โSelf-Harmโ Instructions
https://youtu.be/AS2kJgOgyQ4
ยป Doc :
https://www.knostic.ai/blog/introducing-a-new-class-of-ai-attacks-flowbreaking
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Suicide Bot: New AI Attack Causes LLM to Provide Potential โSelf-Harmโ Instructions
https://youtu.be/AS2kJgOgyQ4
ยป Doc :
https://www.knostic.ai/blog/introducing-a-new-class-of-ai-attacks-flowbreaking
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
YouTube
Copilot - tell me meaning of f.....
A demonstration by the Knostic research team where the LLM has โsecond-thoughtsโ (hence the vulnerability name), proceeding to retract the response.
Microsoft 365 Copilot starts answering a question that its guardrails are supposed to stop, and then haltsโฆ
Microsoft 365 Copilot starts answering a question that its guardrails are supposed to stop, and then haltsโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆTop Malware Analysis Tools:
Ref: Harun Seker, CISSP
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Ref: Harun Seker, CISSP
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
Top 30 Wireshark Filters for Threat Detection.pdf
123 KB
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐จ๐ฐ ๐๐จ๐๐ฌ ๐ ๐๐๐
๐ฐ๐จ๐ซ๐ค?
A Web Application Firewall (WAF) functions by monitoring and filtering HTTP/HTTPS traffic to and from web applications.
๐๐๐ฒ ๐จ๐ฉ๐๐ซ๐๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐จ๐ฆ๐ฉ๐จ๐ง๐๐ง๐ญ๐ฌ ๐ข๐ง๐๐ฅ๐ฎ๐๐: -
๐๐ซ๐๐๐๐ข๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: It scrutinizes incoming and outgoing requests to pinpoint anomalies or potential threats.
๐๐ฎ๐ฅ๐ ๐๐ง๐๐จ๐ซ๐๐๐ฆ๐๐ง๐ญ: Predefined rulesets are applied to identify and mitigate malicious activity. Analytical techniques employed by a WAF encompass:
๐๐ฅ๐๐๐ค๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : This approach blocks requests from known malicious IP addresses, preventing unauthorized access.
๐๐ก๐ข๐ญ๐๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : Only explicitly approved requests are allowed through, enhancing security by default.
๐๐ข๐ ๐ง๐๐ญ๐ฎ๐ซ๐-๐๐๐ฌ๐๐ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง**This method involves recognizing established attack patterns based on known signatures.
**๐๐๐ก๐๐ฏ๐ข๐จ๐ซ๐๐ฅ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: Leveraging machine learning algorithms, the WAF can identify suspicious behaviors that may deviate from normal activity. Unlike traditional antivirus solutions that rely solely on signature detection,
WAFs utilize more sophisticated detection mechanisms.
๐๐ง๐๐ ๐ญ๐ก๐ซ๐๐๐ญ๐ฌ ๐๐ซ๐ ๐๐๐ญ๐๐๐ญ๐๐, ๐ญ๐ก๐ ๐๐๐ ๐ข๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ๐ฌ ๐ญ๐ก๐ ๐๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐ ๐ฆ๐๐๐ฌ๐ฎ๐ซ๐๐ฌ:
๐๐๐ช๐ฎ๐๐ฌ๐ญ ๐๐ฅ๐จ๐๐ค๐ข๐ง๐ : Directly halting any identified malicious requests.
๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ ๐ข๐ง๐ : Recording incidents for further investigation and analysis, facilitating continued improvement of security postures.
Image credit: Cyber Edition
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A Web Application Firewall (WAF) functions by monitoring and filtering HTTP/HTTPS traffic to and from web applications.
๐๐๐ฒ ๐จ๐ฉ๐๐ซ๐๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐จ๐ฆ๐ฉ๐จ๐ง๐๐ง๐ญ๐ฌ ๐ข๐ง๐๐ฅ๐ฎ๐๐: -
๐๐ซ๐๐๐๐ข๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: It scrutinizes incoming and outgoing requests to pinpoint anomalies or potential threats.
๐๐ฎ๐ฅ๐ ๐๐ง๐๐จ๐ซ๐๐๐ฆ๐๐ง๐ญ: Predefined rulesets are applied to identify and mitigate malicious activity. Analytical techniques employed by a WAF encompass:
๐๐ฅ๐๐๐ค๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : This approach blocks requests from known malicious IP addresses, preventing unauthorized access.
๐๐ก๐ข๐ญ๐๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : Only explicitly approved requests are allowed through, enhancing security by default.
๐๐ข๐ ๐ง๐๐ญ๐ฎ๐ซ๐-๐๐๐ฌ๐๐ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง**This method involves recognizing established attack patterns based on known signatures.
**๐๐๐ก๐๐ฏ๐ข๐จ๐ซ๐๐ฅ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: Leveraging machine learning algorithms, the WAF can identify suspicious behaviors that may deviate from normal activity. Unlike traditional antivirus solutions that rely solely on signature detection,
WAFs utilize more sophisticated detection mechanisms.
๐๐ง๐๐ ๐ญ๐ก๐ซ๐๐๐ญ๐ฌ ๐๐ซ๐ ๐๐๐ญ๐๐๐ญ๐๐, ๐ญ๐ก๐ ๐๐๐ ๐ข๐ฆ๐ฉ๐ฅ๐๐ฆ๐๐ง๐ญ๐ฌ ๐ญ๐ก๐ ๐๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐ ๐ฆ๐๐๐ฌ๐ฎ๐ซ๐๐ฌ:
๐๐๐ช๐ฎ๐๐ฌ๐ญ ๐๐ฅ๐จ๐๐ค๐ข๐ง๐ : Directly halting any identified malicious requests.
๐๐ฏ๐๐ง๐ญ ๐๐จ๐ ๐ ๐ข๐ง๐ : Recording incidents for further investigation and analysis, facilitating continued improvement of security postures.
Image credit: Cyber Edition
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ