CheckPlease - Payload-Agnostic Implant Security

BSidesLV 2017

Presented by: Brandon Arvanaghi, Christopher Truncer
Date: Wednesday July 26, 2017
Time: 10:00 - 10:55
Location: Breaking Ground

In this talk, we present CheckPlease, our new repository of implant security modules. CheckPlease is unique in that it is payload-agnostic, meaning we implement every module in PowerShell, Python, Go, Ruby, C#, Perl, and C. In our talk, we not only present on a breadth of new techniques, but we also walk step-by-step through their implementations in newer languages that are seemingly a major increase in payload deliverance.

CheckPlease will serve as the central repository for implant security and, as a byproduct, sandbox detection. In our opinion, the future of sandbox detection is in implant security; by targeting your payload, your odds of executing in a sandbox decrease dramatically. This talk will provide insight into the newest implant security techniques, their implementations, and how payloads in new languages interact with the Windows API.

Christopher Truncer

Christopher Truncer (@ChrisTruncer) is a red teamer with Mandiant. He is a co- founder and current developer of the Veil-Framework, a project aimed to bridge the gap between advanced red team and penetration testing toolsets. Chris began developing toolsets that are not only designed for the offensive community, but can enhance the defensive community's ability to defend their network as well.

Brandon Arvanaghi

Brandon Arvanaghi is a security consultant at Mandiant (a FireEye company). At Mandiant, he has written tools for webshell detection and malware sandbox evasion. He is the author of SessionGopher, CheckPlease, and a contributor to PowerShell Empire. Prior to Mandiant, Brandon conducted research on automated attack plan generation at Vanderbilt University.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats