Skip to content

Latest commit

 

History

History
29 lines (19 loc) · 1.57 KB

README.md

File metadata and controls

29 lines (19 loc) · 1.57 KB

SysCalling

What is this?

SysCalling is an educational project designed to showcase state-of-the-art syscall execution techniques for bypassing user-space EDR controls in a Windows x64 environment. Currently, the project covers the following areas:

Why on the earth?

It's just something I'm really passionate about and have been working on for the past few months, and I didn't want to keep it to myself.

While there are plenty of blogs and articles on the topic, this could also serve as a valuable space to bring together all the knowledge on the subject.

How?

SysCalling uses a classic shellcode injection scenario to illustrate the differences between techniques in a straightforward yet comprehensive attack simulation. This is a well-known attack pattern, so any EDR should be able to recognize and block it. This allows us to assess how the syscall techniques demonstrated here can help malicious software conceal its true intentions.

My personal test results are summarized below. The table shows whether or not the 'attack' was successful on a system protected by New-Gen AV, which uses inline hooking for detection.

WIN API DIRECT SYSCALL INDIRECT SYSCALL VECTORED SYSCALL

Who

@UmaRex01