Anti-Virus Evasion

Applocker

  • AppLocker is an application whitelisting technology introduced with Windows 7.

  • It allows restricting which programs users can execute based on the programs path, publisher and hash.

  • If AppLocker is configured with default AppLocker rules, we can bypass it by placing our executable in the following directory:

C:\Windows\System32\spool\drivers\color
  • This is whitelisted by default.

Nimcrypt2

Help Menu

Usage:
  nimcrypt -f file_to_load -t csharp/raw/pe [-o <output>] [-p <process>] [-n] [-u] [-s] [-e] [-g] [-l] [-v] [--no-ppid-spoof]
  nimcrypt (-h | --help)

Options:
  -h --help     Show this screen.
  --version     Show version.
  -f --file filename     File to load
  -t --type filetype     Type of file (csharp, raw, or pe)
  -p --process process   Name of process for shellcode injection
  -o --output filename   Filename for compiled exe
  -u --unhook            Unhook ntdll.dll
  -v --verbose           Enable verbose messages during execution
  -e --encrypt-strings   Encrypt strings using the strenc module
  -g --get-syscallstub   Use GetSyscallStub instead of NimlineWhispers2
  -l --llvm-obfuscator   Use Obfuscator-LLVM to compile binary
  -n --no-randomization  Disable syscall name randomization
  -s --no-sandbox        Disable sandbox checks
  --no-ppid-spoof        Disable PPID Spoofing

Installation

  • Nimcrypt2 is a fantastic option for obfuscating your binaries, works with sliver, msf, and more

  • generate your payload

Metasploit with Nimcrypt

  • Now encrypt it with nimcrypt2

Metasploit Listener Obsfucation

Nimcrypt and Shellcode / PE

  • Generate your shellcode blob

  • Select a process to inject into, the default process is explorer.exe

  • If the process is not started, nimcrypt will spawn it and then inject into it

Shellcode

PE

Last updated