Havoc C2 Framework - Setup Demonstration with Windows Defender Bypass

Поділитися
Вставка
  • Опубліковано 28 гру 2024

КОМЕНТАРІ • 28

  • @mayarianiabdullah5008
    @mayarianiabdullah5008 10 місяців тому +1

    6:56, this to test if the template being scanners as meterpreter Right ?

  • @passyweb6495
    @passyweb6495 10 місяців тому +1

    thank time to explain, very fast video

  • @techbeam3496
    @techbeam3496 Рік тому +1

    i seems good , bro what did you change there in code can u explain they, how to do .

  • @tlykuyiyhaa8382
    @tlykuyiyhaa8382 Рік тому +1

    good video😄👍, by the way it turned out well in the previous video with donut

    • @gemini_security
      @gemini_security  Рік тому

      Thanks! Glad to hear that you are able to reproduce the results with donut.exe and Quasar RAT! Quasar RAT is a great open sourced tool to play around with!

  • @Krazyyy00
    @Krazyyy00 9 місяців тому +1

    How did u get past the defender tho?

  • @aviwemusa6109
    @aviwemusa6109 9 місяців тому +1

    Can this work on wan on a Windows EC2 instance and Kali inside Vmware?

  • @CHROMEsworldmusic
    @CHROMEsworldmusic Рік тому +1

    I followed along and actually got it to work. You are a beast, may I give you some constructive comments? #1. When you say "now, lets go do this" why dont you follow it up by saying "you can do this by doing this" dont just assume people know what you are doing... your screen is moving so fast. Also, if youre going to do something that is not in the HAVOC documentation (like installing it to your root@kali) you should probably point that out #2 SLOW DOWN your talking lol i had to watch you at 0.5 speed for most of this... thats frustrating #3, you should start a patreon or something so that people (maybe including me) can give you a bit of money for helping them out. I would love to show my appreciation! Awesome content my dude! I love learning new things from you, I am a new subscriber!!!!

    • @gemini_security
      @gemini_security  Рік тому +2

      Wow thanks a lot! That is really very encouraging to hear and I'm really glad you managed to make it work!
      I agree to all of your points made, thanks for taking the time writing it. I will most certainly take note of the feedback provided and slow it down.
      Thanks for bringing up Patreon, I will look into it. From my understanding it seems that I will need to create exclusive content on Patreon for it to work? My time is already very limited so I will probably pass on Patreon for the time being.
      Nonetheless I am really close on getting monetised on UA-cam, a few hundred more watch hours to go. With monetisation and joining the UA-cam Partner Program I think it will open up more features for people to donate directly (something like Super Thanks?). As of now I have recently created a BTC address for donation purposes and this is in the video's description!
      Thanks again for the encouraging comments and feedback! I am really glad you've found it to be useful.

  • @cybersamuraidk
    @cybersamuraidk Рік тому +1

    Good stuff.
    But in this approach the target has to run the DLL (Through CMD) themselves on their windows machine in order to trigger the connection back to Havoc.

    • @cybersamuraidk
      @cybersamuraidk Рік тому

      Do you have an idea what to do, if we want to trigger it through havoc? (i am able to trigger a native demon.x64.dll from havoc) but not this payload

  • @abdullahbilal04
    @abdullahbilal04 Рік тому +2

    Can you teach how to do dll proxying or dll hijacking with the dll you just created

    • @gemini_security
      @gemini_security  Рік тому +1

      Hello, there's a video here on it:
      ua-cam.com/video/20x11YHdJK8/v-deo.html
      else the articles on ired.team is a good reference

  • @ZoominLP
    @ZoominLP 8 місяців тому +1

    I can't even compile the dll doesn't matter how much i change the code 8:40

    • @ZoominLP
      @ZoominLP 8 місяців тому

      I got everything working so far, but the code isn't being executed properly, there's just no connection... How could I implement debuggig for the encryption?

  • @elvinvisuals114
    @elvinvisuals114 Рік тому +3

    I followed the modification of the template .cpp file but when i compile it to .dll and transfer to Windows, it was still detected as virus.

    • @0xAnomaly
      @0xAnomaly Рік тому +4

      That's good. If you dont know what are you doing, it doesn't belong in your hands.

  • @hiddengo3232
    @hiddengo3232 Рік тому +1

    how to bypass applocker and etw

    • @gemini_security
      @gemini_security  Рік тому

      Thanks for the suggestions! Let me see what I can come up with

  • @BabyTaxiVN
    @BabyTaxiVN Рік тому +2

    my love ❤

  • @halfbelf5923
    @halfbelf5923 Рік тому +1

    What are you thinking about such techniques as HalosGate, HellsGate, RecycledGate, TartarusGate? It works today, doesn't it?

    • @gemini_security
      @gemini_security  Рік тому +2

      Yes absolutely. Those are great techniques to use syscalls instead of win32 APIs. I should definitely make a video on these syscall techniques.

  • @tpzy7838
    @tpzy7838 Рік тому +1

    habbibi

  • @mnageh-bo1mm
    @mnageh-bo1mm Рік тому +2

    dude fix your man multiple screens , i can't follow shit

    • @gemini_security
      @gemini_security  Рік тому

      which part? I might have forgotten to zoom in on the Python script modification. Is that the part you're referring to?

    • @mnageh-bo1mm
      @mnageh-bo1mm Рік тому

      @@gemini_security bro the terminal windows ... split them or something... like you can't just minimize them and redisplay them like that.