Alexis, first of all I want to thank you for this fantastic Red Team Fundamentals course! I've done some testing, and unfortunately, despite the video being recent, almost none of the AV evasion techniques work: 1) Invoke-Obfuscation is the only technique that works. 2) Shellter is immediately detected, both with new versions of WinRar (32bit) and with older versions. 3) Shikata Ga Nai is not detected by Windows Defender using 45 iterations, but the listener does not receive the reverse connection. I tried Shikata Ga Nai with different payloads created with MSFVenom, and with different iterations, but either it is detected or it does not make the reverse connection. 4) In no case was I able to obscure a reverse shell created with MSFVenom. The tests were all conducted with Windows Defender on Windows 10 (64bit) in my laboratory. If you have time and desire, you could update the obfuscation techniques by perhaps deepening the topic. In any case, thanks as always, you're the best cybersecurity teacher. See you soon.
UPDATE: Invoke-Obfuscation also works with PowerShell Empire (the CSharp payload is not detected). Unfortunately, the /powershell/privesc/bypassuac module does not work with PowerShell Empire (it is detected, both with obfuscation and without), despite working perfectly with Metasploit.
These videos are great! One question though. Even if you evade the av won't the continuously running command prompt window in the background tip the blue team off?
Great video. But I have a question: following all the steps, I get the infected executable file of winrar, but in my case then windows defender detects it , I just pass it on the victim target. How can I avoid it?Thanks
**Video idea** Show some offensive example of chatgpt How pentester can use it? How will it affect cybersecurity field? Will ai take cybersecurity job in near future?
My regards, brother! Is it possible to recover some photos that I had sent via messenger on a Facebook account that I deleted at the beginning of the year. The person I sent them to was automatically deleted from their inbox when my account was deleted?
you're killing it with this content Hackersploit, please upload more!! I've only seen a few of the red team videos but will def be watching more
The videos of HackerSploit are always Masterclass 💪.
The Explanations are perfectly clear.
Just MASTERCLASS.
Alexis, first of all I want to thank you for this fantastic Red Team Fundamentals course!
I've done some testing, and unfortunately, despite the video being recent, almost none of the AV evasion techniques work:
1) Invoke-Obfuscation is the only technique that works.
2) Shellter is immediately detected, both with new versions of WinRar (32bit) and with older versions.
3) Shikata Ga Nai is not detected by Windows Defender using 45 iterations, but the listener does not receive the reverse connection.
I tried Shikata Ga Nai with different payloads created with MSFVenom, and with different iterations, but either it is detected or it does not make the reverse connection.
4) In no case was I able to obscure a reverse shell created with MSFVenom.
The tests were all conducted with Windows Defender on Windows 10 (64bit) in my laboratory.
If you have time and desire, you could update the obfuscation techniques by perhaps deepening the topic.
In any case, thanks as always, you're the best cybersecurity teacher.
See you soon.
UPDATE: Invoke-Obfuscation also works with PowerShell Empire (the CSharp payload is not detected).
Unfortunately, the /powershell/privesc/bypassuac module does not work with PowerShell Empire (it is detected, both with obfuscation and without), despite working perfectly with Metasploit.
I recently finished the PTSv2 course, you're a phenomenal teacher!
Can you please give the link of same ?
@@Nikita-sj8og It's hosted on the INE platform, you need to purchase at least a monthly subscription to take the course.
Where can you finish that course He is ine platform instructor or not
Gonna watch all your videos and comment after watching them
Pretty hard to keep a good man down... Welcome Back HS...
15'56'' You are fantestic....great video!!!!!
happy too see you after a long time
This is top notch material.
Awesome video. Always providing great content…. Merry Christmas 🎉
thank you hackersploit 😍😍
Finally… welcome back
Welcome back 🎉
After a long time came with the video.alex my favourite mentor . Can I request any video topics?
Welcome back!
These videos are great! One question though. Even if you evade the av won't the continuously running command prompt window in the background tip the blue team off?
awesome thanks!
but most EDR's today are really good at stopping shellter from my experience
good to see you sir
Welcome back sir
Return of the Mack! good to be back.
@@HackerSploit yes sir today i was watching your video thinking for new video
I am a big fan of youuuuuu
best hacking content ever 👍💯 , keep up the good work
As usual great video. How many videos will come in this series
Will share the outline in a separate video/live stream.
yaaaay!!!!! its been a while
Great video. But I have a question: following all the steps, I get the infected executable file of winrar, but in my case then windows defender detects it , I just pass it on the victim target. How can I avoid it?Thanks
Is this part of red teaming fundamental series part
We follow your channel here in Brazil,,🇧🇷✨ if possible put subtitles in your videos !!!!
can you help me .I cant install powershell it says "Package 'powershell' has no installation candidate"
Hello Hackersploit. Can You Help Me ?. I Am interesting in Cybersecuirty. Which Books Can You Recommend To Me ?. Which Books Should l Read ?
Input "sudo wine shellter.exe" prompt "wine: could not load kernel32.dll, status c0000135", what should I do?
long time no see alexis
best vdo
pleseee review HavocFramework
**Video idea**
Show some offensive example of chatgpt
How pentester can use it?
How will it affect cybersecurity field?
Will ai take cybersecurity job in near future?
Yo finally !
My regards, brother! Is it possible to recover some photos that I had sent via messenger on a Facebook account that I deleted at the beginning of the year. The person I sent them to was automatically deleted from their inbox when my account was deleted?
I work as a blue teamer at my job, but love seeing on the other side of the fence. You will not evade my defenses >:)
I can try :)
My request please kindly explain ISO 27001 because every cyber security job asking this
Hlo sir i am from India 🙏🏻
Plz would u help me how would i start my journey in cybersec field
Where in the hell is the link my man
Hi bro, my laptop hacked plz help me
Did you stop the WebApp series Sir
Guess the webapp series got pushed back
let me come in top10
Where are Web Pentesting videos :D
Great video. I've tried to do the same, but my Antivirus detected this and blocked it.
Yeah, it seems to work on windows defender but many modern AVs are sophisticated enough to pick up on simple cases like these
Yeah I'm first 🥇🥇🥇🥇🥇😃😃😃
Please make video's on web app hacking
Your wish is my command.
Thank you sir...... It means a lot
7th?
Detected by AV..