Metasploit is one of the most widely used exploit frameworks globally; threat actors, penetration testers and red teams alike use it, as it is completely free and open source.
Although Metasploit has been around for a while now, some of its capabilities are still able to evade security solutions, making it difficult to identify malicious code that has been wrapped in Metasploit encoders. One such encoder is Shikata-Ga-Nai, which is used by Metasploit as an evasion mechanism for delivering payloads. Shikata-Ga-Nai, which roughly translated means “nothing can be done about it”, was used in Shikitega, a newly discovered Linux-targeted malware.
In our latest Campaign of the Week, we go in deep to learn about one of Metasploit’s best encoding schemes – Shikata-Ga-Nai. The campaign includes a technical analysis performed by Cyberbit’s researchers, and essential detection methods. Don’t wait till your organization has been attacked because when it comes to mitigation, well… – “Shikata-Ga-Nai” – nothing can be done about it.