Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation

preview_player
Показать описание
In this video, I will be exploring the process of dynamically injecting Shellcode into portable executables and PowerShell obfuscation for the purpose of defense evasion on Windows.

Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts.

//PLATFORMS

//SOCIAL NETWORKS

//BOOKS

//SUPPORT THE CHANNEL

//CYBERTALK PODCAST

//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

-----------------------------------------------------------------------------------
#redteaming #cybersecurity #pentesting
Рекомендации по теме
Комментарии
Автор

you're killing it with this content Hackersploit, please upload more!! I've only seen a few of the red team videos but will def be watching more

RealCyberCrime
Автор

The videos of HackerSploit are always Masterclass 💪.
The Explanations are perfectly clear.
Just MASTERCLASS.

fabricenade
Автор

Awesome video. Always providing great content…. Merry Christmas 🎉

baidysall
Автор

I recently finished the PTSv2 course, you're a phenomenal teacher!

ilbona
Автор

Alexis, first of all I want to thank you for this fantastic Red Team Fundamentals course!

I've done some testing, and unfortunately, despite the video being recent, almost none of the AV evasion techniques work:

1) Invoke-Obfuscation is the only technique that works.

2) Shellter is immediately detected, both with new versions of WinRar (32bit) and with older versions.

3) Shikata Ga Nai is not detected by Windows Defender using 45 iterations, but the listener does not receive the reverse connection.
I tried Shikata Ga Nai with different payloads created with MSFVenom, and with different iterations, but either it is detected or it does not make the reverse connection.

4) In no case was I able to obscure a reverse shell created with MSFVenom.


The tests were all conducted with Windows Defender on Windows 10 (64bit) in my laboratory.

If you have time and desire, you could update the obfuscation techniques by perhaps deepening the topic.

In any case, thanks as always, you're the best cybersecurity teacher.

See you soon.

korovamilkplus
Автор

15'56'' You are fantestic....great

zarandija
Автор

Gonna watch all your videos and comment after watching them

parkour.parkour
Автор

best hacking content ever 👍💯 , keep up the good work

NightMaRe-xltr
Автор

After a long time came with the video.alex my favourite mentor . Can I request any video topics?

arupsen
Автор

Pretty hard to keep a good man down... Welcome Back HS...

mynealways
Автор

These videos are great! One question though. Even if you evade the av won't the continuously running command prompt window in the background tip the blue team off?

netstreamer
Автор

awesome thanks!
but most EDR's today are really good at stopping shellter from my experience

Tathamet
Автор

Great video. But I have a question: following all the steps, I get the infected executable file of winrar, but in my case then windows defender detects it, I just pass it on the victim target. How can I avoid it?Thanks

gianlucasanfilippo
Автор

As usual great video. How many videos will come in this series

rishabhrana
Автор

Hi...I'm jordan and I'm new to the channel

jordanyoung
Автор

We follow your channel here in Brazil, , 🇧🇷✨ if possible put subtitles in your videos !!!!

passaronegro
Автор

can you help me .I cant install powershell it says "Package 'powershell' has no installation candidate"

GliddingHippo
Автор

Input "sudo wine shellter.exe" prompt "wine: could not load kernel32.dll, status c0000135", what should I do?

xsTaoo
Автор

Hello Hackersploit. Can You Help Me ?. I Am interesting in Cybersecuirty. Which Books Can You Recommend To Me ?. Which Books Should l Read ?

r.e.d
Автор

My regards, brother! Is it possible to recover some photos that I had sent via messenger on a Facebook account that I deleted at the beginning of the year. The person I sent them to was automatically deleted from their inbox when my account was deleted?

vufyjmr