In my previous diary[1], I explained why Python became popular for attackers. One of the given reason was that, from Python scripts, it's possible to call any Windows API and, therefore, perform low-level activities on the system. In another script, besides a classic code injection in a remote process, I found an implementation of another goold old technique: live patching of a DLL.
In my previous diary[1], I explained why Python became popular for attackers. One of the given reason was that, from Python scripts, it's possible to call any Windows API and, therefore, perform low-level activities on the system. In another script, besides a classic code injection in a remote process, I found an implementation of another goold old technique: live patching of a DLL.
It has been a while since I started to track how Python is used in the Windows eco-system&#;x26;#;x5b;1&#;x26;#;x5d;. Almost every day I find new pieces of malicious Python scripts. The programming language itself is not malicious. There are plenty of reasons to use Python on Windows. Think about all Didier&#;x26;#;39;s tools&#;x26;#;x5b;2&#;x26;#;x5d;, Most of them are written in Python!
It has been a while since I started to track how Python is used in the Windows eco-system&#;x26;#;x5b;1&#;x26;#;x5d;. Almost every day I find new pieces of malicious Python scripts. The programming language itself is not malicious. There are plenty of reasons to use Python on Windows. Think about all Didier&#;x26;#;39;s tools&#;x26;#;x5b;2&#;x26;#;x5d;, Most of them are written in Python!
Do you want to analyze decrypted TLS traffic in Wireshark or let an IDS, like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic? There are many different TLS inspection solutions to choose from, but not all of them might be suitable for the sp[...]