Creating a .EXE Binary that FULLY Evades Windows Defender (AGAIN!) in 2024!

Sdílet
Vložit
  • čas přidán 4. 01. 2024
  • Join the Hack Smarter community: hacksmarter.org
    --- AV Evasion is a cat & mouse game. In this video, I become the mouse who evades the cat (again) by creating a .exe binary that fully evades Windows Defender and provides the attacker with a stable reverse shell. This is working as of January 5th, 2024.
    Here are the resources mentioned in the video:
    Powershell Script: github.com/gh0x0st/Get-Revers...
    ps2exe: www.powershellgallery.com/pac...
    THM Stealth Room: tryhackme.com/room/stealth
    Happy hacking!
  • Věda a technologie

Komentáře • 76

  • @rationalbushcraft
    @rationalbushcraft Před 6 měsíci +1

    Nice. I have not seen your channel before but I am subbed now. This was a perfect mix of explanation and being concise.

  • @BrendanFitzpatrick-th2kh
    @BrendanFitzpatrick-th2kh Před 5 měsíci

    This is dope! Thanks for the great video, you just earned a new subscriber!

  • @josh_tes
    @josh_tes Před 6 měsíci +2

    You are a saint sir. It is so difficult to find relevant pentesting content that is applicable to the real world and not just a lab environment. THANK YOU! As of January 14th this works, however within a few seconds of getting the shell Defender notices and kicks you out.
    Edit: It's actually a bit spotty, the first time I tested it I lost the shell in a few seconds. The second time I tested - I maintained the shell for as long as I wanted. Time to see if we can get an obfuscated meterpreter shell to run in memory successfully so that we can dump the SAM.

  • @phillydee3592
    @phillydee3592 Před 4 měsíci

    Great vid!!Will try this later this afternoon👍🏼

  • @jackychng3148
    @jackychng3148 Před 6 měsíci

    Cool video! Love your content! Would be looking forward to more interesting contents in the future! 😊😊

  • @CodeWithTito
    @CodeWithTito Před 6 měsíci

    That is absolutely insane. Have to try it out on my home lab

  • @dexterburns-ko1wc
    @dexterburns-ko1wc Před 3 měsíci

    Quite informative!!

  • @kamalsharma2839
    @kamalsharma2839 Před 6 měsíci +1

    Awesome as usual

  • @overgrowncarrot1
    @overgrowncarrot1 Před 6 měsíci

    Letttsssss gooooo, that was awesome.

  • @usmanahmad6609
    @usmanahmad6609 Před 6 měsíci

    Thank You!

  • @mkwaliyo
    @mkwaliyo Před 2 měsíci +1

    Discussed this technique today in class. Tried and it worked. Thanks

    • @TylerRamsbey
      @TylerRamsbey  Před 2 měsíci

      Wow, that's awesome! Did the teacher use this video, or did you just stumble across while looking into the technique?

    • @mkwaliyo
      @mkwaliyo Před měsícem

      @@TylerRamsbey He suggested it. I came here watch your video and implemented it.

  • @dustinhxc
    @dustinhxc Před 6 měsíci

    Awesome!

  • @alexdhital3095
    @alexdhital3095 Před 2 měsíci

    Awesome

  • @cyberlocc
    @cyberlocc Před 6 měsíci +4

    Great Video as usual, you dont have near enough subs.

  • @mohammadhosein6847
    @mohammadhosein6847 Před 6 měsíci

    When you execute pwsh reverse shell on memory, can AMSI detect that?
    We have to disable it?

  • @palette454
    @palette454 Před měsícem

    Still work perfectly, but how tf do you escalate privileges ? I can't transfer the shell to a meterpreter, or download any file through it. I can only do basics windows commands like cd, dir, etc (while i'm 100% sure on a Powershell shell)

  • @mic27381
    @mic27381 Před měsícem

    But doesn’t windows warn, that the file could be milicious?In the new versions windows even „flags“(not sure what exactly it does) files inside of downloads zip files(as long as you unzip it with explorer)?

  • @EFXTVe
    @EFXTVe Před 3 měsíci

    I actully worked, I tried 2nd time it failed. Not it any OS in my network. By the way Loved your concept.

  • @BrendanFitzpatrick-th2kh
    @BrendanFitzpatrick-th2kh Před 5 měsíci

    @Tyler Ramsbey you said it's important for pentesters to have a Windows virtual machine. My laptop has a maximum of 8GB RAM and I am therefore running Kali Linux as the host OS. I have Windows 7, Windows 10 and Windows 11 iso files I can use. Which would you recommend I install as a virtual machine on my pentesting laptop?

  • @JasonBorejszo50
    @JasonBorejszo50 Před měsícem

    Would this type of stealth evade other anti-virus packages like Sophos, Eset, Bit Defender, etc?

  • @ThreatBytes
    @ThreatBytes Před 6 měsíci

    What rule can one put to detect ?

  • @lumikarhu
    @lumikarhu Před 3 měsíci

    so it's been 4 months now but it'll work as long as you dont touch the disk since defender is super stupid. i wrote a simple dropper in C over smb today (april 1st) and loaded the raw shell over straight into memory - defender is silent. didn't obfuscate the dropper executable. Not april fool's. in fact i think it could work over https too

  • @Techie-rm3bo
    @Techie-rm3bo Před měsícem

    How to do for Mac Machine ?

  • @andrejapolenik8606
    @andrejapolenik8606 Před 4 měsíci

    what about smartscreen?

  • @miyamoto85
    @miyamoto85 Před 4 měsíci

    Is this relevant to OSEP?

  • @kxvlv
    @kxvlv Před měsícem

    At the moment that the victim try to download that .exe, Windows Defender is gonna tell the victim that this is a virus

  • @jumboobese9013
    @jumboobese9013 Před 3 měsíci

    please help tyler! how do I fix: 1. a parameter cannot be found that matches parameter name 'Url' 2. Exception calling 'GetString' with '1' argument(s): "Array cannot be null. Parameter name: bytes" and 3. Cannot bind argument to parameter 'Command' because it is null. Thanks

  • @spacex9999
    @spacex9999 Před 6 měsíci

    Just curious, would an attack like this always be detected by the top AV's such as Kaspersky and BitDefender?

    • @DanielLevitt-yv8sx
      @DanielLevitt-yv8sx Před 2 měsíci

      tried it on avira and avast premium av and it bypassed it, but kapersky and bitdefender didnt... custom coded payload will have no bad signatures so it will bypass it.

  • @greyburns6170
    @greyburns6170 Před 5 měsíci

    Lol I hate to be this guy. And I love your content. But it's such a love/hate feeling. Because we can only find so many unpatched holes in the wall before the wall is eventually sealed up tight. Lol I watch your videos and they work 100% which says a lot. And then a month later defenders onto us lol

  • @idoeini429
    @idoeini429 Před 9 dny

    Nope. Defender caught it

  • @FJB-bl8xg
    @FJB-bl8xg Před 6 měsíci

    Need to show windows defenders settings. Defender has ASR that prevents downloading of scripts. Was that enabled?

    • @TylerRamsbey
      @TylerRamsbey  Před 6 měsíci

      Yes. Worked on this as well as my host OS which is Windows 11 Pro with everything enabled

    • @FJB-bl8xg
      @FJB-bl8xg Před 6 měsíci

      @@TylerRamsbey With everything enabled with Intune Windows Defender this is blocked. Running the exe or copy and pasting the downloads script get "Invoke-Expression: This script contains malicious content and has been blocked by your antivirus software. " Thanks for the information. I enjoyed trying this. ASR rules with the block! Not sure if ASR available or enabled with out Intune.

    • @FJB-bl8xg
      @FJB-bl8xg Před 6 měsíci

      Security.Microsoft reports "Suspicious sequence of exploration activities" & "An active 'PsObfus' malware in a PowerShell script was prevented from executing via AMSI"

  • @spongebobiscoming8142
    @spongebobiscoming8142 Před 5 měsíci +1

    Is a way to load it in like a pdf file while still executing ps1 script?

    • @WindowsDaily
      @WindowsDaily Před 20 dny

      Of course, they'd just download and run the extra file (probably from the temp folder) as well as their own code to get in.

    • @spongebobiscoming8142
      @spongebobiscoming8142 Před 19 dny

      ​@@WindowsDaily Oh, That's pretty cool because it would basically cover it

  • @Proxima_Centauri_199
    @Proxima_Centauri_199 Před 3 měsíci +1

    How? I created a simple ps1 file by writing [ Write-Host "Hello" $null = Read-Host ] but as soon as I convert it to an exe file, Windows Defender detects it as a virus 😅

  • @VBV1234
    @VBV1234 Před 6 měsíci +2

    Is this also undetectable on Windows 11? didnt try it yet

    • @TylerRamsbey
      @TylerRamsbey  Před 6 měsíci

      Yes

    • @FootballSeagull
      @FootballSeagull Před 5 měsíci

      No, not a fully patched Machine. Just tested in on 21H2 and it was fine, but gets blocked on 22H2

    • @TylerRamsbey
      @TylerRamsbey  Před 5 měsíci +2

      Once again, AV Evasion techniques usually only last a few weeks until they are patched - especially when the technique is made public.

  • @ltd2vn
    @ltd2vn Před měsícem +1

    Windows Defender blocked 😢

  • @xsTaoo
    @xsTaoo Před 4 měsíci

    Windows doesn't seem to detect netcat x64.exe, but it does detect netcat x32.exe. I don't know why this is

  • @cutycat2000
    @cutycat2000 Před 5 měsíci

    Detected by kaspersky ;)

  • @user-ir4xt5ye3r
    @user-ir4xt5ye3r Před 5 měsíci

    Av doesn't detect the executable because you created it, try downloading it from a web page using chrome then av will detect it easly

  • @BenSpruce-101
    @BenSpruce-101 Před 2 měsíci

    README - you can literally ask chatgpt to make you a reverse shell and listener and for some reason it evades defender use pyinstaller to turn to exe if you want still evades

  • @charlesmarseille123
    @charlesmarseille123 Před 6 měsíci

    this is so simple, anyone can do this. wow.

  • @Ayanami00
    @Ayanami00 Před 3 měsíci

    dang downloading the stage 1 got detected aint no way google detected and windows immediate action of blue screen

    • @TylerRamsbey
      @TylerRamsbey  Před 3 měsíci +1

      AV Bypasses usually only last a few weeks or a month -- they quickly get detected when released to the public (like this one).

    • @Ayanami00
      @Ayanami00 Před 3 měsíci

      @@TylerRamsbey ye didn't expect to patch that fast hahahaa 😂 they sure are undefeated man I swear be going weeks straight and not be able to do it. Although what I managed to do is bypassing all anti virus application which is just impressive to me but I can't forget that I can't bypass windows

  • @user-vo1vp3lm6o
    @user-vo1vp3lm6o Před 4 měsíci

    not working anymore

  • @greyburns6170
    @greyburns6170 Před 4 měsíci +7

    Well just to update everyone. Windows defender caught me the second i tried to save the .exe to my desktop. Got the notification and a few seconds later it deleted it from my desktop. Lol i find it ironic that you have a "shush" face on this video while youre actively telling the entire world. And yet again this method is now obsolete. Only took a few months.

    • @TylerRamsbey
      @TylerRamsbey  Před 4 měsíci +2

      That's how AV Evasion works -- it's a cat and mouse game. Also, I'm on the ethical side of things. I'm totally fine with Windows Defender picking up on this now. I have other methods I use for pentesting that I do not share with the public.

    • @greyburns6170
      @greyburns6170 Před 4 měsíci

      @@TylerRamsbey so what happens to cybersecurity when inevitably every vulnerability is patched? Seems like we ain't too far away. Everything will be secure through automated processes and then our whole industry will be legacy not just the programs. Seems like everyone was a hacker until hackers started going to jail and now everyone wants to be on the cybersecurity side. When you got a million guards in one area eventually the areas impenetrable. Then the guards are just standing around with their thumb up their ass.

  • @hablemosdetodo12
    @hablemosdetodo12 Před 5 měsíci

    It gets detected

    • @TylerRamsbey
      @TylerRamsbey  Před 5 měsíci +2

      Yup, that's the cat & mouse game of AV Evasion. Usually if you find a method to evade and share it with the public, it will be patched within a few weeks.

  • @electronlayer9843
    @electronlayer9843 Před 4 měsíci

    That windows version looks old.

    • @TylerRamsbey
      @TylerRamsbey  Před 4 měsíci +2

      It is Windows Server because I didn't want to share my host OS on stream. That being said, it also worked on my host OS which is Windows 11. But due to the nature of AV Evasion, this is now detected by Defender.
      Generally when you find an AV Bypass and release it to the public, it will only remain valid for a few weeks before it's patched.

  • @jo-fe9mb
    @jo-fe9mb Před 3 dny

    man I thought it was going to be actual coding, not script kiddie stuff

  • @SquadTech12
    @SquadTech12 Před 6 měsíci

    First comment thanks bro

  • @trollsec4
    @trollsec4 Před 2 měsíci

    patched