Defense Evasion

Here are the articles in this section:AV Bypass with Metasploit Templates and Custom Binariesarrow-up-rightEvading Windows Defender with 1 Byte Changearrow-up-rightBypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessionsarrow-up-rightBypassing Cylance and other AVs/EDRs by Unhooking Windows APIsEDR / AV Evasionarrow-up-rightWindows API Hashing in MalwareEvasionarrow-up-rightDetecting Hooked Syscallsarrow-up-rightCalling Syscalls Directly from Visual Studio to Bypass AVs/EDRsarrow-up-rightRetrieving ntdll Syscall Stubs from Disk at Run-timearrow-up-rightFull DLL Unhooking with C++EDR evasionarrow-up-rightEnumerating RWX Protected Memory Regions for Code InjectionCode Injection, Defense Evasionarrow-up-rightDisabling Windows Event Logs by Suspending EventLog Service Threadsarrow-up-rightObfuscated Powershell InvocationsDefense Evasionarrow-up-rightMasquerading Processes in Userland via _PEBUnderstanding how malicious binaries can maquerade as any other legitimate Windows binary from the userland.arrow-up-rightCommandline ObfusactionCommandline obfuscationarrow-up-rightFile Smuggling with HTML and JavaScriptarrow-up-rightTimestompingDefense Evasionarrow-up-rightAlternate Data Streamsarrow-up-rightHidden FilesDefense Evasion, Persistencearrow-up-rightEncode/Decode Data with CertutilDefense Evasionarrow-up-rightDownloading Files with CertutilDownloading additional files to the victim system using native OS binary.arrow-up-rightPacked BinariesDefense Evasion, Code Obfuscationarrow-up-rightUnloading Sysmon DriverUnload sysmon driver which causes the system to stop recording sysmon event logs.arrow-up-rightBypassing IDS Signatures with Simple Reverse Shellsarrow-up-rightPreventing 3rd Party DLLs from Injecting into your Malwarearrow-up-rightProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)arrow-up-rightParent Process ID (PPID) Spoofingarrow-up-rightExecuting C# Assemblies from Jscript and wscript with DotNetToJscriptarrow-up-right

最后更新于

这有帮助吗?