- https://institute.sektor7.net/rto-win-evasion
ntdll!NtTraceEvent
(Syscall) : https://whiteknightlabs.com/2021/12/11/bypassing-etw-for-fun-and-profit/ntdll!EtwEventTrace
: https://www.mdsec.co.uk/2020/03/hiding-your-net-etw/- https://pre.empt.dev/posts/maelstrom-etw-amsi/#Event_Tracing_for_Windows
- Pasting ret opcode (c3 for x64) at the beginning of
ntdll!EtwEventWrite
function in order to skip the Security Check done byntdll!__security_check_cookie
.
Video link: https://drive.google.com/file/d/1XXlBqH6aF5ZRQM9MCz83NpGfCwtMvQFe/view?usp=sharing
- Pasting ret opcode (c3 for x64) at the beginning of
ntdll!NtTraceEvent
syscall (NOT touching ETW) in order to skipsyscall
from going into kernel, so loses the capability to write ETW events to the file system..
Video link: https://drive.google.com/file/d/1LikUb86L66A0PgZqIUi97nvn-T_et2CR/view?usp=sharing