Anti-Virus Evasion
Applocker
AppLocker is an application whitelisting technology introduced with Windows 7.
It allows restricting which programs users can execute based on the programs path, publisher and hash.
If AppLocker is configured with default AppLocker rules, we can bypass it by placing our executable in the following directory:
C:\Windows\System32\spool\drivers\colorThis is whitelisted by default.
Nimcrypt2
Help Menu
Usage:
nimcrypt -f file_to_load -t csharp/raw/pe [-o <output>] [-p <process>] [-n] [-u] [-s] [-e] [-g] [-l] [-v] [--no-ppid-spoof]
nimcrypt (-h | --help)
Options:
-h --help Show this screen.
--version Show version.
-f --file filename File to load
-t --type filetype Type of file (csharp, raw, or pe)
-p --process process Name of process for shellcode injection
-o --output filename Filename for compiled exe
-u --unhook Unhook ntdll.dll
-v --verbose Enable verbose messages during execution
-e --encrypt-strings Encrypt strings using the strenc module
-g --get-syscallstub Use GetSyscallStub instead of NimlineWhispers2
-l --llvm-obfuscator Use Obfuscator-LLVM to compile binary
-n --no-randomization Disable syscall name randomization
-s --no-sandbox Disable sandbox checks
--no-ppid-spoof Disable PPID SpoofingInstallation
Nimcrypt2 is a fantastic option for obfuscating your binaries, works with sliver, msf, and more
generate your payload
Metasploit with Nimcrypt
Now encrypt it with nimcrypt2
Metasploit Listener Obsfucation
Nimcrypt and Shellcode / PE
Generate your shellcode blob
Select a process to inject into, the default process is
explorer.exeIf the process is not started, nimcrypt will spawn it and then inject into it
Shellcode
PE
Last updated