当前位置:网站首页>CS kill-free pose
CS kill-free pose
2022-08-03 19:12:00 【Antview Network Security】
Foreword
The red team generally uses fishing to break through the boundary in HVV, and the blue team uses fishing to achieve traceability and countermeasures, but they are all inseparable from a good kill-free horse., Windows Defender and Symantec and other mainstream anti-software are no problem.
The working principle of anti-software
There are many ways to detect and kill software, such as feature recognition, which is based on virus samples collected by various manufacturers and the virus characteristics extracted from virus samples, so the ability to kill software also depends on the size of the virus database to a certain extent., this feature-based recognition is generally based on static.The working principle of heuristic can basically be defined as dynamic killing or a killing method of machine learning method.
How to avoid killing
•By modifying the signature code, the virus sample features that trigger the anti-software rules can be located according to the method of taint detection. Modifying the obvious features can avoid killing to a certain extent.
•To avoid killing the flower instructions, add garbage instructions in the program shellcode or feature code area, the added garbage instructions will not affect the file execution, and the verification will be inconsistent in dynamic killing or file hash comparison.
•Packers, such as upx packers, etc. After the general file is landed, the hash value can also be bypassed.
•Secondary compilation, generally used for secondary compilation of shellcode to bypass anti-software.
• Poweshell is free from killing, but general protection software or the system itself will generate an alarm when the powershell application is normally invoked. General security devices cannot pass through, and you need to use commands to bypass security device monitoring.
Don't kill
CS generates payload
Add listener to generate payload
Download go-strip.exe and obfuscate the binary go compilation information
download link
https://cdn.githubjs.cf/boy-hack/go-strip/releases/download/v3.0/go-strip_0.3.4_windows_amd64.zip
Run script bypass
go run main.go
The core content is the encryption method
The shellcode is encrypted at two layers.
The source code is not directly put here, because I am worried that the sample will be tagged, here are a few projects recommended, try to use go here instead of python
https://github.com/TideSec/BypassAntiVirus
https://github.com/admin360bug/bypass
https://github.com/hack2fun/BypassAV/blob/master/bypass.cna
Here I modified the generated exe.Install tinder, check and kill
CS Online
Packer
Add another shell test.Address
https://upx.en.softonic.com/
Simple Compression Shell
upx.exe -f Go_bypass.exe
The size of the exe file of the birthday after packing is 406KB
You can see that the file size before packing is 1011kb
Modify the file name after packing to upx_Go_bypass to confirm the online status
Successfully launched, continue to check the kill-free effect after packing
At this time, the velvet does not report poison to the files before and after packing
Although the virus was reported before the package, but the virus was not reported after the package.
Symantec has not reported poisoning, and other anti-virus software will not be released.But be careful not to use cloud sandbox detection.
Summary
Multiple tests will always lead to new discoveries. It is relatively easy to practice, but it is important to pay attention to the effect of avoiding kills.
边栏推荐
- 学弟:我适不适合转行做软件测试?
- Web项目Controller统一返回实体类
- POJ 2377 Bad Cowtractors(最大生成树)
- 【Azure 事件中心】使用Azure AD认证方式创建Event Hub Consume Client + 自定义Event Position
- Alibaba senior experts create a learning architecture from scratch, including Alibaba's internal technology stack PPT, PFD actual combat
- 阿里巴巴政委体系-第六章、阿里政委体系运作
- 七夕之前,终于整出了带AI的美丽秘笈
- MVC vs MVP
- awk语法-02-运算、数组、格式化输出
- 要想成为黑客,离不开这十大基础知识
猜你喜欢
盲僧发现了华点——教你如何使用API接口获取数据
LeetCode 952. 按公因数计算最大组件大小
Compose原理-compose中是如何实现事件分法的
Mkke:为什么无法从Oracle 11g或12c升级到Oracle 23c?
Zhong Hua, senior architect of Ali: China-Taiwan strategic thinking and architecture practice; including internal implementation manual
实时渲染器不止lumion,Chaos Vantage你值得一试
阿里资深架构师钟华曰:中台战略思想与架构实战;含内部实施手册
WEB 渗透之RCE
MPLS的简单应用于实验
idea——同一项目开启多个实例(不同端口)
随机推荐
WEB 渗透之RCE
Postgresql源码(65)新快照体系Globalvis工作原理分析
首届MogDB征文活动开启啦!
LOL英雄联盟卡顿掉帧问题解决办法 2022年8月1日
读取 resources 目录下的文件路径的九种方式,你知道多少?
【ORACLE】什么时候ROWNUM等于0和ROWNUM小于0,两个条件不等价?
Compose原理-compose中是如何实现事件分法的
如何理解即时通讯开发移动网络的“弱”和“慢”
软件测试回归案例,什么是回归测试?
Alibaba senior experts create a learning architecture from scratch, including Alibaba's internal technology stack PPT, PFD actual combat
[Notes] Introduction to machine learning
讯方实训云平台——加速教育高质量发展的“数字底座”!
Word另存为PDF后无导航栏解决办法
机器学习的方法总结
[Azure Event Hub] Create Event Hub Consume Client + Custom Event Position with Azure AD Authentication
软件测试技术之如何编写测试用例(3)
[笔记]机器学习之前言介绍
pg_memory_barrier_impl in Postgresql and C's volatile
Web项目中简单使用线程池
unity3d-游戏物体控制方法