HADESS
Cyber Security Magic

EDR Evasion Techniques using Syscalls (EBook)

EDR Evasion Techniques using Syscalls EDR Evasion Techniques using Syscalls

Endpoint Detection and Response (EDR) solutions have become a cornerstone in the cybersecurity landscape, offering real-time monitoring and response capabilities to threats at the endpoint level. However, as with any security measure, adversaries continually seek ways to bypass or neutralize them. One of the emerging trends in this cat-and-mouse game is the use of syscalls and API calls to evade detection. This article introduces some of the notable techniques and tools in this domain, including SysWhispers, Tartarus Gate, Perun’s Fart, Hell’s Gate, Hell’s Hall, and more.

  1. The Power of Syscalls and API Calls

Syscalls (system calls) are direct interfaces to the operating system’s kernel, allowing software to request services from the kernel. By invoking syscalls directly, malware can bypass the higher-level APIs that EDR solutions typically monitor, making detection more challenging.

API (Application Programming Interface) calls, on the other hand, are a set of routines and tools for building software applications. Malware can misuse these calls or use less common APIs to evade detection.

  1. SysWhispers

SysWhispers is a tool that aids in the generation of shellcode that invokes syscalls directly. By doing so, it can bypass security products that monitor API calls. SysWhispers provides a bridge between current red team tooling and direct syscall execution to enhance evasion.

  1. Tartarus Gate

Tartarus Gate is a sophisticated technique that dives deep into the realm of syscalls. It’s a method that leverages the power of syscalls to execute code and manipulate processes, all while staying under the radar of most EDR solutions.

  1. Perun’s Fart

Named after the Slavic god of thunder, Perun’s Fart is a technique that focuses on finding a fresh, unhooked copy of ntdll without reading it from the disk. The idea is to exploit the brief window between a new process’s instantiation and the moment AV/EDR tools inject their hooks.

  1. Hell’s Gate and Hell’s Hall

Hell’s Gate and Hell’s Hall are techniques that revolve around dynamic system call invocation. By leveraging these methods, attackers can execute syscalls dynamically, making it harder for EDR solutions to detect malicious activities.

Leave a Reply

Your email address will not be published. Required fields are marked *