Overview
The course aims to teach learners how to gain dynamic access to the .NET runtime using IronPython as an alternative to PowerShell, bypassing Microsoft's protections. The skills taught include understanding .NET runtime, creating weaponization PoCs, building Implant/C2 frameworks, and using IronPython for offensive operations. The teaching method involves a talk covering the discovery process, challenges faced, and a demo of the SILENTTRINITY framework. This course is intended for offensive security personnel looking to adapt their tradecraft in response to evolving security measures.
Syllabus
Intro
Agenda
PowerShell
Dotnet
Dotnet Assembly
Managed Unmanaged Code
Dotnet Languages
Assembly That Load
Interoperability
Why CSharp
PowerShell in CSharp
Common problems
Required assemblies
IronPython
Demo
BooLang
ClearScript
Advantages
Other languages
Django
To v20
Defenses
CounterStep
Biggest Giveaway
Long Term Goal
Taught by
Hack in Paris