Protect Your Payloads: Modern Keying Techniques

DerbyCon 8.0 - Evolution

Presented by: Leo Loobeek
Date: Friday October 05, 2018
Time: 15:00 - 15:50
Location: Kentucky F & G
Track: Track 4

Our payloads are at risk! Incident responders, threat hunters, and automated software solutions are eager to pick apart your new custom dropper and send you back to square one. One answer to this problem is encrypting your payload with key derivation functions ("keying") which leverages a variety of local and remote resources to build the decryption key. Throughout this talk I will present modern keying techniques and demo some tools to help along the way. I will start with showing how easy it is to discover attacker infrastructure or techniques in the payloads we commonly use every day. I will then quickly review how keying helps and the considerations when generating keyed payloads. Throughout the presentation many practical examples of keying techniques will be provided which can be used for typical pentests or full red team operations. Finally I will introduce KeyServer, a new piece to add to your red team infrastructure which handles advanced HTTP and DNS keying. Using unprotected payloads during ops should be a thing of the past. Let’s regain control of our malicious code and make it harder on defenders! This talk is based on the original research of environmental keying by Josh Pitts and Travis Morrow.

Leo Loobeek

Leo Loobeek is a senior consultant with Protiviti performing offensive security operations ranging from textbook whitebox pentests to stealth and red team exercises. With plenty of areas within offensive security, Leo finds his niche in command-and-control, novel execution techniques, and safeguarding precious new droppers with keying techniques. Leo knows enough to know he doesn’t know anything.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats