Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Reimplementing Local RPC in .Net

Hack In The Box Security Conference via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course teaches how to reimplement local RPC in .NET for writing proof-of-concepts in C# or PowerShell. The learning outcomes include assessing approaches to implementing an RPC client in .NET, reverse engineering APIs, implementing NDR parsing and serialization, and integrating with PowerShell. The course covers topics such as architectural overview, IDL, server definition, structure marshalling, client implementation, finding RPC server interfaces, and fuzzing. The intended audience for this course is individuals interested in computer hardware and software security, logical vulnerabilities, and RPC implementations. The teaching method includes a presentation by a security researcher with over 10 years of experience in the field.

Syllabus

Intro
Architectural Overview
Interface Definition Language (IDL.)
MIDL Compiler
Auto-generated Server Definition Information
Example NDR Format String
Structure Marshalling
Client Implementation (32 bit)
Managed Implementation
Finding RPC Server Interfaces
iterative Approach
Undocumented Byte Codes
Going to the Standards
Arrays of Structures with Pointers
A Simple Alex Ionescu Trick
Finding the ALPC Port
Mapping Types
Simple Example
Dealing with Out Parameters in PowerShell
Find New Windows RPC Apis
Fuzzing
Possible Future Work

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Reimplementing Local RPC in .Net

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.