Bypassing Defender and AMSI with NukeAMSI

Поділитися
Вставка
  • Опубліковано 17 січ 2025

КОМЕНТАРІ • 15

  • @tebo2286
    @tebo2286 2 місяці тому +3

    Another awesome presentation. Thank you for sharing

  • @AbelSheferaw
    @AbelSheferaw 2 місяці тому

    Another great content! Your hard work and creativity really shine through. Keep up the awesome work!

  • @abhisharma-fb4fr
    @abhisharma-fb4fr 6 днів тому

    Thank you for showcasing my tool sir

  • @ohmsohmsohms
    @ohmsohmsohms 2 місяці тому +1

    Let’s get it another cyber attack&defense vid

  • @BestITintelligence
    @BestITintelligence 2 місяці тому

    Good topic for all merci

  • @Fuddifadu
    @Fuddifadu 14 днів тому

    Awesome, looking forward to more

  • @nyshone
    @nyshone 2 місяці тому +1

    Does it affect different EDR vendors by chance?

    • @CyberAttackDefense
      @CyberAttackDefense  2 місяці тому +3

      It should work against many EDR vendors. You would need to test your specific vendor. I did test against some of the bigger ones and it worked.

  • @Kingdd1os
    @Kingdd1os 2 місяці тому

  • @autohmae
    @autohmae 2 місяці тому

    Not my field of expertise normally, but just encoding and using eval or equivalent would by pass your check...?
    Edit: ahh, of course, you are checking for eval-like keywords as well.

    • @CyberAttackDefense
      @CyberAttackDefense  2 місяці тому

      Good question! Any rule I would use in practice would be much more robust in looking for encoding evaluation statements and the like. The good thing is first pass on many forms of encoding is done by windows. Nothing substitutes dynamic analysis with breakpoints though.

    • @autohmae
      @autohmae 2 місяці тому

      @@CyberAttackDefense just implement a custom encoding, that's pretty common.