Assumptions

As an operator, we rely heavily on our tools. Once we get our reverse shell, we will bring our tools onto the compromised machine and continue our engagement.

Enter C2’s; Command and Control. They are complex tools with multiple components. Typically there are:

Implants are capable of many complex functions that a standard reverse shell cannot do.

If this solves the issue of running our tools after exploitation, then what more is there to discuss? Well, C2 implants fall under the same issue as our tools; they will get caught. Both during execution, or maybe some function are capable of will trigger an alarm.

Evasion focuses on two things which can be independent of each other.

To do these tasks, we generally have to get a bit on the lower level of things. Since a lot of this deals with memory, there are APIs we will have to utilize our code. These APIs are commonly watched from the EDR side of things, so we still have to take caution when creating our evasion.