Rednote
GuidebooksTerminalCode
  • Welcome!
  • Utility
    • General
    • Server
    • Transferring File
      • Main
      • Code
      • Miscellaneous
    • Reverse & Bind Shells
      • Havoc
    • Metasploit
    • Service
      • FTP (21)
      • SSH (22)
      • DNS (53)
      • HTTP/HTTPS (80-443)
      • SMTP (25-465-587)
      • POP3 (110-995)
      • IMAP (143-993)
      • MySQL (3306)
      • MSSQL (1433-2433)
      • SMB (139-445)
      • RDP (3389)
      • WinRM (5985-5986)
      • WMI (135)
      • LLMNR & NBT-NS (5355-137)
      • NFS (111-2049)
      • SNMP (161-162)
      • VNC (5900)
      • Rsync (873)
      • R-Service (512-513-514)
      • IPMI (623)
      • Oracle TNS (1521)
  • Pentesting Process
    • Information Gathering
      • Passive
      • Active
      • OSINT
    • Vulnerability
    • Web Attacks
      • GENERAL
      • Crawling/Spidering & Fuzzing
      • Information Disclosure
      • Command Injection
      • Unrestricted File Upload
      • File Inclusion/Path Traversal
      • Request Smuggling
      • Clickjacking
      • Web Cache Poisoning
      • Web Cache Deception
      • Insecure Deserialization
      • Prototype Pollution
      • OAuth 2.0
      • JWT
      • SQLi
        • sqlmap
      • NoSQLi
      • GraphQL
      • XSS
      • SSRF
      • XXE
      • IDOR
      • API
      • SSTI
      • CSRF
      • CORS
      • AJP
      • SSI
      • ESI
      • XSLT
      • Cloud
      • LLM Prompt Security
    • Software Attacks
      • Binary
      • Shellcode
      • AV Evasion & Obfuscation
    • Network Attacks
      • ARP Poisoning
      • Local DNS Cache Poisoning
      • Baby Local DoS
    • Crypto Attacks
      • Utility
      • RSA
      • DSA/DSS
      • PRNG
        • LGC
        • MT
        • LFSR
    • Misc Attacks
    • Social Engineering
    • Password Cracking
      • Wordlist
      • Offline
      • Online
    • Pivoting & Tunneling
    • Local Enumeration
      • Linux
      • Windows
    • Privilege Escalation
      • Linux
        • Linux Privilege Escalation with Groups
        • Linux Privilege Escalation with Library
      • Windows
        • Windows Privilege Escalation with Groups and Privileges
        • Windows Privilege Escalation with DLL Hijacking
    • Active Directory
      • Enumeration
      • Abuse ACL
      • Extract Hash & Password
      • Pass The Hash
      • Pass The Ticket
      • Overpass the Hash
      • Relay Attack
      • Password Spraying Attack
      • AS-REP Roasting
      • Kerberoasting
      • Silver Ticket
      • Golden Ticket
      • DC Synchronization
      • AD Certificates
      • Attacking Domain Trusts
    • Reports
      • Bug Bounty Report
    • CVE
      • Linux
      • Windows
    • OTHER
      • CMS
        • WordPress
        • Joomla
        • Drupal
      • Tomcat
      • Jenkins
      • Splunk
      • Web Service
      • Navigating Python Objects
      • JavaScript Deobfuscation
  • Extra
    • My Books
    • My Exploits
    • Compiled Binaries
Powered by GitBook
On this page
  • Tools
  • Archives with password
  • Packer
  • Using WSL

Was this helpful?

  1. Pentesting Process
  2. Software Attacks

AV Evasion & Obfuscation

Last updated 7 months ago

Was this helpful?

On-disk Evasion, In-memory Evasion. You need to try to bypass AMSI in Windows.

Tools

Tool
Details

It is an .exe, so for Linux you need Wine. sudo dpkg --add-architecture i386; sudo apt-get update sudo apt-get install wine32 sudo apt-get install shellter -y cd /usr/share/windows-resources/shellter sudo wine shellter.exe Simple binary in /usr/share/windows-binaries/ Payload with msfvenom and EXITTHREAD=process

pwsh

> Import-Module .Invoke-Obfuscation.psd1

> Invoke-Obfuscation > SET SCRIPTBLOCK <COMMAND>

./ScareCrow -I <PAYLOAD> -d <www.domainToImitate.com> -encryptionmode AES

Yet to be seen

Archives with password

Storing information and putting a password in the archive bypasses many common antivirus signatures today. However, the downside of this process is that they will be raised as notifications in the AV alert dashboard as unscannable due to being locked with a password.

Download rar from or sudo apt-get install rar.

rar a <NEW_NAME> <MYFILE1> <MYFILE2> [...] -p

Also try to archive it multiple times.

Packer

Process in which the payload is compressed together with an executable program and decompression code into a single file. When executed, the decompression code reverts the backdoored executable to its original state.

, , Alternate EXE Packer, ExeStealth, Morphine, MEW, Themida.

HERE
UPX packer
The Enigma Protector
MPRESS
Using WSL
shellter
Invoke-Obfuscation
ScareCrow
darkarmour