AV / EDR Evasion

Toy EDRs
Recon
Search for active AV processes on hosts (local admin priveleges required):
Identify Microsoft.NET version from inspecting assembly properties:
Identify Microsoft.NET version from querying the registry:
Windows build <-> default .NET Framework version associations:
1511
4.6.1
1607
4.6.2
1703
4.7
1709
4.7.1
1803
4.7.2
1909+
4.8
.NET Framework version <-> CLR version associations:
2.0, 3.0, 3.5
2
4, 4.5-4.8
4
Note that we don't have to target the exact .NET Framework version when compiling our tools. It's enough to match the above relationship between .NET Framework version and CLR version, i. e. all 4.x versions will execute on CLR v4. For example, Rubeus compiled to target v4.5 will run on a machine with only .NET v4.0 installed.
Potential scan exclusions:
C:\Windows\System32\LogFiles\C:\Windows\System32\inetsrv\C:\Windows\ClusterStorage\C:\ProgramData\Microsoft\Windows\Hyper-V\
Attacking EDRs
Hard-style launch prevention using IFEO:
Hard-style launch prevention using BootExecute:
Hard-style launch prevention using PPL process start:
WFP-Based Prisons
EDRSilencer
EDRPrison
WinDivert
.NET:
Python:
ARP Spoofing + Scapy
Name Resolution Policy Table
Add rule:
Remove rule:
EDR Blindspots
Bring Your Own Interpreter (BYOI)
Python
Pyramid
BOFs with Python
Python RDI
Backdoor Electron Applications (JavaScript)
PE Obfuscation
OLLVM
Install LLVM 13.x obfuscator based on heroims/obfuscator and tpoechtrager/wclang:
TinyCC
String Encryption
Tools
Shellcode Mutation
Tools
PowerShell Tactics
PowerShell Obfuscation
Invoke-Obfuscation
Out-EncryptedScript.ps1
PowerShellArmoury
Tools
msfvenom
Veil-Evasion
Hyperion + Pescramble
GreatSCT
Install and generate a payload:
Exec with msbuild.exe and get a shell:
Ebowla
PEzor
Wrap executable into PEzor:
inceptor
ScareCrow
charlotte
MeterPwrShell
stager_libpeconv
Last updated