PwC安全技术小组
搜索...
Ctrl
K
技术
技术 - 红队攻击手段介绍
offensive-security
Defense Evasion
上一页
Code & Process Injection
下一页
Enumeration and Discovery
最后更新于
4年前
这有帮助吗?
Here are the articles in this section:
AV Bypass with Metasploit Templates and Custom Binaries
Evading Windows Defender with 1 Byte Change
Bypassing Windows Defender: One TCP Socket Away From Meterpreter and Beacon Sessions
Bypassing Cylance and other AVs/EDRs by Unhooking Windows APIsEDR / AV Evasion
Windows API Hashing in MalwareEvasion
Detecting Hooked Syscalls
Calling Syscalls Directly from Visual Studio to Bypass AVs/EDRs
Retrieving ntdll Syscall Stubs from Disk at Run-time
Full DLL Unhooking with C++EDR evasion
Enumerating RWX Protected Memory Regions for Code InjectionCode Injection, Defense Evasion
Disabling Windows Event Logs by Suspending EventLog Service Threads
Obfuscated Powershell InvocationsDefense Evasion
Masquerading Processes in Userland via _PEBUnderstanding how malicious binaries can maquerade as any other legitimate Windows binary from the userland.
Commandline ObfusactionCommandline obfuscation
File Smuggling with HTML and JavaScript
TimestompingDefense Evasion
Alternate Data Streams
Hidden FilesDefense Evasion, Persistence
Encode/Decode Data with CertutilDefense Evasion
Downloading Files with CertutilDownloading additional files to the victim system using native OS binary.
Packed BinariesDefense Evasion, Code Obfuscation
Unloading Sysmon DriverUnload sysmon driver which causes the system to stop recording sysmon event logs.
Bypassing IDS Signatures with Simple Reverse Shells
Preventing 3rd Party DLLs from Injecting into your Malware
ProcessDynamicCodePolicy: Arbitrary Code Guard (ACG)
Parent Process ID (PPID) Spoofing
Executing C# Assemblies from Jscript and wscript with DotNetToJscript