How Hackers Hide

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ต.ค. 2022
  • j-h.io/snyk Huge thanks to Snyk for supporting the channel and sponsoring this video! Please show Snyk some love and check out all the awesome stuff they are up to: j-h.io/snyk
    Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
    🐜Zero2Automated ➡ MISP & Malware Sandbox j-h.io/zero2auto-sandbox
    ⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🤹‍♀️SkillShare ➡ j-h.io/skillshare
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

ความคิดเห็น • 147

  • @jb_lofi
    @jb_lofi ปีที่แล้ว +34

    John, you're an inspiration and got me into the cybersec industry. Don't be ashamed about your code quality; what matters is it works to the required standard. If you wanted or needed to write top-notch code all the time even for a quick solution out in the field, you'd be a programmer.

  • @TeenNewsLive
    @TeenNewsLive ปีที่แล้ว +187

    TLDR: They use glob* wildcards to match the target application they're trying to run instead of calling it outright. The target app in this case would be the schedule task app. This helps with circumventing automatic static analysis.

    • @2Champions
      @2Champions ปีที่แล้ว +10

      These are not regex, glob patterns, but yeah

    • @sadboi6956
      @sadboi6956 ปีที่แล้ว +4

      not regex please correct

    • @malborboss5710
      @malborboss5710 ปีที่แล้ว +3

      *TLDW

  • @DarkFaken
    @DarkFaken ปีที่แล้ว +35

    Hey John, you don't need to apologise or feel embarrassed about your script. It's definitely not perfect and I'm sure given the time you could come up with something better. However you did an amazing job to put this video together and showcase your handy tool, you're giving so much back to the community, don't be so hard on yourself.

    • @jb_lofi
      @jb_lofi ปีที่แล้ว

      This.

  • @gnulnx7133
    @gnulnx7133 ปีที่แล้ว +10

    John: I'm embarrassed about my code.
    *The code is actually better than 99% of my codes*

  • @jimmyc3030
    @jimmyc3030 ปีที่แล้ว +15

    im right with you on loving obfuscation. It may seem silly, but its so cool to see the weird and wacky ways people disguise what theyre doing. Thanks for the awesome video :D

  • @beni9129
    @beni9129 ปีที่แล้ว +16

    This looks really cool. Im a CS major interested in Cybersecurity and after seeing this, I totally want to give that coding problem a try. I can't say how efficient i'd make it, but it looks like something ive never done before and that's how I like it. To be honest it would be a really good project to add to my resume too haha.

  • @pedallknife
    @pedallknife ปีที่แล้ว +4

    This is awesome, and never hesitate to show code, because (most of us) aren't even near you level! Thanks for this John!

  • @LxciferXIII
    @LxciferXIII ปีที่แล้ว +5

    Honestly its a lot easier to just make your commands look like typical network traffic. Admin can be gained without touching disk a lot of the time, once you have an admin account a good portion of commands blend into the background. Its more data exfil that requires an advance level of obfuscation.

  • @NKCSS
    @NKCSS ปีที่แล้ว +4

    One way to make it faster and more plesant, is to treat each folder separately; no need to do the whole loop again when one part of the path changes; then you can offer choices for each section.

  • @kicks2897
    @kicks2897 ปีที่แล้ว +5

    This is fun... I can completely understand as a researcher why this is exciting despite those "interesting" conversations. Defensive sec people love to downplay the capability of a simple trick until it works everywhere where it supposedly shouldnt. I share the same level of enthusiasm as you for neat tricks like this... 👍👍

  • @schlaus_kwab
    @schlaus_kwab ปีที่แล้ว +1

    don't scold yourself, Ricky, this was fun and educational to watch. Thanks for sharing cool stuff

  • @patrickshepherd1341
    @patrickshepherd1341 ปีที่แล้ว +2

    Couple things:
    a) I'm so sorry, but I can't help but see you as the child of Seth Rogen and Ed Sheeran. Lol please forgive me.
    b) I LOVE this channel. I finished a phd in cs a year ago, but my work is all social simulation stuff, nothing to do with security. I did have to do buffer overflows and reverse engineering assembly just a little bit, but that was only one class. I always wondered about the details of a lot of things we heard about, but there were never any examples. This channel is every worked example I could ever ask for!
    I know just enough to follow along with what you're doing most times, and watching you work through everything is SO INSTRUCTIVE. I've learned a ton already, and I've been binging your videos for a couple weeks. No plans to stop any time soon; I'm gonna start some CTF challenges myself because of all this.
    Thanks dude! Keep up the awesome work!

  • @nimoo1929
    @nimoo1929 ปีที่แล้ว +3

    I learnt this technique from you. Thank you sir for this video. ❤

  • @iblackfeathers
    @iblackfeathers ปีที่แล้ว

    you can use your program that enumerates through all the different wildcard possibilities and instead make them as directories on your system after replacing the question marks with a different character.
    find which pathways are targeted the most and create these empty directories to the point where explicit pathways are necessary.
    using wildcards will produce numerous outputs and becomes less practical that calling out specific and explicit pathways.

  • @atsekbatman
    @atsekbatman ปีที่แล้ว

    Very interesting! Thank you!

  • @nicholasdacri
    @nicholasdacri ปีที่แล้ว

    Whenever I hear John’s voice I get really relaxed! So I will keep advocating for his asmr :D

  • @grayshell8928
    @grayshell8928 ปีที่แล้ว

    this is quite neat, thanks for the update John

  • @MrNolimitech
    @MrNolimitech ปีที่แล้ว

    Great subject and great video, as always. Python can be slow ONLY, and ONLY when you have tested with Asyncio / Multiprocessing / CPython. But I think in this case, it can do the trick, because we don't need to wait for a result to create another one.

  • @skysurfer_kon1641
    @skysurfer_kon1641 ปีที่แล้ว

    Thanks for the tutorial, I'll try it out

  • @bakedmuffinman87
    @bakedmuffinman87 ปีที่แล้ว

    wow that is pretty awesome. thanks for everything your doing!

  • @scottspa74
    @scottspa74 ปีที่แล้ว

    John, ] you're awesome, Mark. Inspiring. Keep up the great work

  • @QuickFixHicks914
    @QuickFixHicks914 ปีที่แล้ว +24

    I don't think its a bad idea, because the question is "How many people actually look at the logs like they're suppose to?" I want to start getting into making more projects like you made. The code wasn't perfect but you saw your vision out.

    • @jb_lofi
      @jb_lofi ปีที่แล้ว +1

      That's the thing, if I see any form of obfuscation (or even use of rare aliases in PowerShell) my suspicion is increased 100 fold. This might help you avoid certain forms of static analysis or string filtering, etc, but if you _do_ see this in the logs, you've probably found something interesting...

    • @JorgetePanete
      @JorgetePanete ปีที่แล้ว

      supposed*

    • @JorgetePanete
      @JorgetePanete ปีที่แล้ว

      it's*

  • @dawsoking2
    @dawsoking2 ปีที่แล้ว

    The wildcard syntax looks a lot like what was happening in the powershell reverse engineering video you encountered previous

  • @armoghan
    @armoghan ปีที่แล้ว +1

    Love your videos 🖤

  • @everything-om3zx
    @everything-om3zx ปีที่แล้ว +1

    dont listen to people ur the best my brother we love u. :)

  • @numero7mojeangering
    @numero7mojeangering ปีที่แล้ว +1

    I was wondering if applications uses this to find paths or is it just a tool in the command line for users? Also if apps uses this. What happens if I create a new folder?

  • @SeveredSanctum
    @SeveredSanctum ปีที่แล้ว +1

    Well looking at the output of your shortest code:
    $env:?????????T\
    Is always the shortest path that populates:
    To optimize it you would just have to tell your loops to only check the end parts of the script, as when you performed the full look up, It was also cycling:
    $env:???????OO?\
    which does not need to be checked.

  • @Jacob-ABCXYZ
    @Jacob-ABCXYZ ปีที่แล้ว

    I remember you talking a out IEX alternatives in a past video. I wonder if there's a good way to further obfuscate this (or get this to function in an environment that is less friendly toward IEX)

  • @torsec6048
    @torsec6048 ปีที่แล้ว

    love your code john !

  • @fram1111
    @fram1111 ปีที่แล้ว

    Thanks, more videos on how to find the hack or attack... and destroy them!

  • @ancestrall794
    @ancestrall794 ปีที่แล้ว

    Awesome vid John

  • @arcowo
    @arcowo ปีที่แล้ว

    This script would be a good opportunity to implement some "dynamic programming" tricks such as memoization. Might help speed it up.

  • @Boolap1337
    @Boolap1337 ปีที่แล้ว

    Video suggestion!
    Do the Hacktheboo ctf's - would love to see em

  • @ITSSIRWAN86
    @ITSSIRWAN86 ปีที่แล้ว

    awesome jhon

  • @doge1931
    @doge1931 ปีที่แล้ว

    this would be awesome if you could use some of that * wildcard action on my Junk Mail Block list. Been trying to get wildcards working for junk mail filtering forever.

  • @chrisfahie2767
    @chrisfahie2767 ปีที่แล้ว

    It can't get anymore simple than this. Thank you soo much howtobasic!

  • @cyphodias1640
    @cyphodias1640 ปีที่แล้ว

    @John your code is beautiful on the inside ❤

  • @WhereAreTheJesusShoes
    @WhereAreTheJesusShoes ปีที่แล้ว +1

    This is what I’ve been what for. Yaaaaassssss im so happy 😁

  • @kaare1992
    @kaare1992 9 หลายเดือนก่อน

    "It takes a long time, it's not ideal..."
    So it takes like hours? Yeah I can see that's a long time.
    "It takes like 30 seconds to a minute"
    Oh... That's way faster than I expected.

  • @lancemarchetti8673
    @lancemarchetti8673 ปีที่แล้ว

    This is so cool!

  • @YouMadBro514
    @YouMadBro514 ปีที่แล้ว

    "Ferb i know what are we gonna do today!"

  • @derrickochieng9555
    @derrickochieng9555 ปีที่แล้ว

    i love u so much bro, thanks very much

  • @dandk_
    @dandk_ ปีที่แล้ว +2

    It's like cybersecurity wordle

  • @uskrzydlacz
    @uskrzydlacz ปีที่แล้ว

    wow, news from a few decades ago. really impressive, clap, clap, clap ...

  • @djcb4190
    @djcb4190 ปีที่แล้ว

    I knew these hackers. There are musical effects.

  • @aymaneelhadi2954
    @aymaneelhadi2954 ปีที่แล้ว

    Hey man, It works great and without any problems.

  • @leandrolej
    @leandrolej 3 หลายเดือนก่อน +1

    How Reloaded, Razor1911, Fitgirl etc etc can "hide" for so long time ?

  • @goodboy8833
    @goodboy8833 ปีที่แล้ว

    In linux to bypass the rule based firewall & regex we can use same method
    ex: cat /etc/pa??wd
    cat /etc/pa????

  • @danielbloom2470
    @danielbloom2470 ปีที่แล้ว

    Obfuscation is a deprecated practice. If you still use this method, you deserve the part van.

  • @dclxviclan
    @dclxviclan ปีที่แล้ว

    Wow, dude, great job 👍💬🔥

  • @Lampe2020
    @Lampe2020 ปีที่แล้ว +2

    14:58 This reminds me of Matt Parker's code to find five five-letter words that have no letters in common...

  • @PassionataDance
    @PassionataDance ปีที่แล้ว

    Is there a powershell command to detect when someone is using these?

  • @logiciananimal
    @logiciananimal ปีที่แล้ว

    Neat idea. Is the source code in github or the like?

  • @CA-FE-C0-FF-EE-00
    @CA-FE-C0-FF-EE-00 ปีที่แล้ว

    Why not getting a few short version from every step/directory for the specified path, save them and join them together for a variety of version to chose from.
    So first check, what's the best way for env, then system32,...
    And at the end join some versions together for printing a variety to choose from :)
    Sorry for my bad explanation but I'm not English and can't code :D but thought this make it alot easier to process.
    Thanks for the video tho, very inspiring :)

  • @ishanpatel597
    @ishanpatel597 ปีที่แล้ว

    Defender wants to know your location 😂

  • @InfernalOd1n
    @InfernalOd1n ปีที่แล้ว

    I love Snyk. We use it at my work.

  • @scizophreniac
    @scizophreniac ปีที่แล้ว

    i assume a hacky way of protecting against this would be to create decoy dirs that satisfy the wildcards, like C:\Windows\System31...

  • @MajidLearner
    @MajidLearner 8 หลายเดือนก่อน +1

    @Johnhammond please do part 2

  • @JontheRippa
    @JontheRippa ปีที่แล้ว

    Wow 😮👍👍👍👌

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 11 หลายเดือนก่อน

    What can I do for generating in the Calcutta

  • @jackalexander8842
    @jackalexander8842 ปีที่แล้ว

    I'm wondering if you know any free, online beginner resources to teach people how to code? I watched a video on PyCharm/Python and followed the baby steps, understanding most of the concepts, but the series ended abruptly after simply teaching you how to code a thermometer (maybe there was more somewhere else behind a pay wall, idk..). I really want to try to learn some technical skill and ability with computers to hopefully effect a career change but I can't afford courses etc as too many mouths to feed! And I can't really attend a classroom setting due to having to work ~72hrs a week. At the bottom end of the ladder the salaries in IT fields for unskilled folk is literally half my current salary and I cant take that pay cut. Is there anything you know of that I can do remotely to get the knowledge, even if that comes without accreditation? Sorry for long message..

  • @riordan381
    @riordan381 ปีที่แล้ว

    If you are from a developing country, 99% of ISP will be dynamic, so you ips are always changing everytime you connect back. Unlike USA, where you are given a static IP by your ISP.
    Dynamic IP equal safety
    Pair with a proxy randomizer and proxy shell on your network.
    You will be untraceable

  • @Kitejrpaladin
    @Kitejrpaladin ปีที่แล้ว

    This seems like the sort of problem computer scientists and leet coders salivate about.
    If I had to take a guess, it’s something like figure out the minimum amount of changes required to autocomplete your chosen path (Yes I know it’s a super obvious definition)
    So if you had a trie filled with the characters with all the paths from having a all ? glob. The only location that must have a character is where there are branches that lead away from the result.
    Something like that, I’m not a leet coder lol I could be wrong, this is more of an answer coming from intuition.
    This generates one answer but the nice thing is because we know the minimum character locations required to get the chosen result then it becomes very easy to generate all the other potential matches. Just replace the ? that aren’t part of the minimum with characters from the path.

  • @amirniko8014
    @amirniko8014 ปีที่แล้ว

    what is the final benefit for all of that ?

  • @charliebaby7065
    @charliebaby7065 ปีที่แล้ว +1

    I got tossed an obfuscated url once without any fancy clones characters..
    Not sure exactly how it was done.
    I recall there's some kind of... Targeting syntax used first.
    Like some underlying url code that may trigger say Google maps to load the URL right away.
    But tweaked
    It said dub dub dub Google cm like it should but definitely took me far from it

  • @whtiequillBj
    @whtiequillBj ปีที่แล้ว +1

    I recently watched: JavaScript Is Weird (EXTREME EDITION) by, Low Byte Productions. Do you ever find anything like this when breaking down some malicious code?

    • @logiciananimal
      @logiciananimal ปีที่แล้ว

      I've done secure code reviews where the developers have inadvertently done "weird things" which meant doing the review is harder.

  • @gregg718
    @gregg718 ปีที่แล้ว

    Interesting

  • @SNO2207
    @SNO2207 ปีที่แล้ว

    you should rewrite it in c++! its so fast 👍

  • @liamwhalen
    @liamwhalen ปีที่แล้ว +1

    Would it be quicker to set each directory as its own variable, find all the glob permutations for each variable, then combine them together to get all the total permutations?

    • @luketurner314
      @luketurner314 ปีที่แล้ว

      If that is the case, would multithreading speed it up any further? Example:
      target = "C:\dir_1\dir_2\dir_3\file.ext"
      splitting gives us a list:
      "C:\dir_1"
      "C:\dir_1\dir_2"
      "C:\dir_1\dir_2\dir_3"
      "C:\dir_1\dir_2\dir_3\file.ext"
      assign each entry in the list to a thread or core
      each thread/core runs the permutation finding code only on the last part (output to a file perhaps)
      then when you want to get a result, it could pick one randomly from each set/group

    • @liamwhalen
      @liamwhalen ปีที่แล้ว

      @@luketurner314 I was thinking something like
      target = "C:\dir_1\dir_2\dir_3\file.ext"
      splitting gives us a list:
      var1 = "C:\dir_1"
      var2 = "\dir_2"
      var3 = "\dir_3"
      var4 = "\file.ext"
      I'm not up on threaded programming, but it seems like those four variables could be sent to different threads to create all the possible glob patterns. When those threads return, then recombine the four variables to get all possible combinations. Depending on the threads available, that could also be threaded. Set thread 1 at var1 mutable, var2, var3, var4 static. Thread 2 at var2 mutable, var1, var3, var4 static, ... thread n at var1, var2, var3, var4 mutable.
      However the final string is chosen, it would need to be checked to make sure it doesn't pickup more than one file.

    • @luketurner314
      @luketurner314 ปีที่แล้ว

      ​@@liamwhalen If each thread checks for a single match on each iteration of the glob pattern permutation, then you won't need to at the end when combining the partial results. These single match checks shouldn't be computationally expensive since the subdirectories are cached beforehand. That's why I had the list contain full paths that could be checked during the permutation iteration.

    • @liamwhalen
      @liamwhalen ปีที่แล้ว

      @@luketurner314 I defined the problem in another way. If the user is looking for a single string to use, it is probably quicker (in a problem space of say >= 3 directories) to generate all the possible combinations first. Once that is done choosing one from them can be done and checked. A directory search is going to be a system call of some sort even if the information is cached (and the user may not be able to guarantee that a target system has anything cached). As well, once all the combinations are present, then advanced options could be added to qualify how the string is chosen e.g. User wants > 10 single character substitutions and < 5 wildcards, and the filename can have at most 2 characters.

    • @luketurner314
      @luketurner314 ปีที่แล้ว

      @@liamwhalen Maybe it would be quicker to only check at the end, but IIRC in the video the caching and permutation finding is done on the attacker's machine before the attack even begins

  • @jtoddcyber
    @jtoddcyber ปีที่แล้ว +1

    Your worst Python is better than my best.

  • @coolbreeze0938
    @coolbreeze0938 ปีที่แล้ว

    I would be interested to see how fast the script ran on the version of PY used here and the new 3.11 you posted a video about.

    • @amerispunk
      @amerispunk ปีที่แล้ว

      Exactly. Python 3.11 is supposed to be about 20% faster in most tasks generally. It's worth checking...

  • @GustavoPinho89
    @GustavoPinho89 ปีที่แล้ว

    Lookin' slim.

  • @ddeboy002
    @ddeboy002 ปีที่แล้ว

    10 go to DOS
    20 go to 10
    end
    (endless dos screens open up. If you really want to piss off the scammer just put this into startup. Every time to try to reboot dos continues.)

  • @InuYasha-SitBoy
    @InuYasha-SitBoy ปีที่แล้ว

    an actual way they hide is putting null byte character im beginning of key names of registry causing an item not to show in the gui. a badass would use dinvoke

  • @FUTUREPES
    @FUTUREPES ปีที่แล้ว

    Wow

  • @Paul-kr8dq
    @Paul-kr8dq ปีที่แล้ว

    Well, it leads us to even more funny idea. What about writing a tool, which will analyze the content of a filesystem and derive the minimal set of fake folder names, that should be created to let all such globes fail? It should be the simplest but effective protection against this kind of obfuscation 🤣

  • @scarlettwhyte4170
    @scarlettwhyte4170 ปีที่แล้ว

    17:25 play with it in C? :D

  • @ian562ADF52E
    @ian562ADF52E ปีที่แล้ว

    You have the "if main==name" thing, so your python code is already better than most of mine.

  • @kylewalker6049
    @kylewalker6049 ปีที่แล้ว

    How is malware signed with a ceritficate? How do they bypass Windows Defender Smartscreen?

    • @thedosiusdreamtwister1546
      @thedosiusdreamtwister1546 ปีที่แล้ว

      Certificates get stolen all the time. Nvidia had a couple stolen earlier this year.

  • @KamalUddin-ih1vs
    @KamalUddin-ih1vs ปีที่แล้ว +1

    Sir plz made a video in bug bounty 🥺

  • @Jaktechnologies
    @Jaktechnologies ปีที่แล้ว

    "AT" for the WIN, not listed still there.

  • @pekhejdj
    @pekhejdj ปีที่แล้ว

    true i tried.

  • @withrejkapermana6087
    @withrejkapermana6087 ปีที่แล้ว

    lemme be your stundent sensei!

  • @guilherme5094
    @guilherme5094 ปีที่แล้ว

    👍

  • @VECTORY_
    @VECTORY_ ปีที่แล้ว

    i need help,
    short said:
    i have a virus,
    he gets activated every 3 months.
    its annoying,
    i still have the virus on an usb stick to share.
    if you could look into it,
    would be nice,
    thx

    • @VECTORY_
      @VECTORY_ ปีที่แล้ว

      why has this guy such a problem with bots?

  • @area0750
    @area0750 ปีที่แล้ว

    Basically, this is just another way to obfuscate a string constant? Or well, to obfuscate certain file paths.
    Does it have any advantage over, for example, storing the encrypted/encoded file path with the key and then decrypting/decoding it?

    • @qsxmirage7274
      @qsxmirage7274 ปีที่แล้ว +1

      Yeah lots of antimalware will catch it on decryption this is kinda more hiding in plain sight

  • @adityapandey7171
    @adityapandey7171 ปีที่แล้ว

    😎👍

  • @RjLevesque
    @RjLevesque ปีที่แล้ว

    Real hackers won't use Microcrap Winblows

  • @nasonmamu
    @nasonmamu 10 หลายเดือนก่อน

    Hey John, I need your help please, I have qualified to do software engineering in the next two weeks time but my biggest problem I don't know how to do coding.kindly help

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 11 หลายเดือนก่อน

    Full file explain How to time.

  • @IXxStereo
    @IXxStereo ปีที่แล้ว +1

    Finally something I can use for work 😂😂

  • @liveunderflow5511
    @liveunderflow5511 ปีที่แล้ว +1

    Give me source code of envy John!

  • @vancejensen3844
    @vancejensen3844 ปีที่แล้ว

    Did you just say “me me”?!?!

  • @InuYasha-SitBoy
    @InuYasha-SitBoy ปีที่แล้ว

    i think this is a waste tbh because you would have to know a lot of specific info about a system. random things might accidentally be run instead or it might not working depending on which version or framework they have installed. dinvoke and c# would be better to bypass antivirus. they wouldnt flag the keys or env vars anyway. unless it relates to like a super common bypass or wtv like the windir key in environment of hkcu

  • @JanxZ
    @JanxZ ปีที่แล้ว

    ok

  • @brunolopes7311
    @brunolopes7311 ปีที่แล้ว

    can you tell what is the best CTF for people that are complete ignorant about hacking like me? lol

  • @rushikeshpatil6017
    @rushikeshpatil6017 ปีที่แล้ว

    can we obsfucate "-ep bypass" ??

    • @rushikeshpatil6017
      @rushikeshpatil6017 ปีที่แล้ว

      @@thedosiusdreamtwister1546 so it should bypass and run the "powershell -ep bypass" command right ?

  • @jurajchobot
    @jurajchobot ปีที่แล้ว

    09:52 Why would such option even exist? As far as I understood it the "?" wild card character does nothing good to anyone trying to work with the system but makes the life of threat defenders a nightmare as antimalware software might get in trouble finding a malicious code, that is basically just question marks that Windows is going to evaluate to the closest command. Isn't it stupid? Or maybe even downright dangerous practice?

    • @HawksAndSwords
      @HawksAndSwords ปีที่แล้ว

      $env:whatever is just a string.
      You can find the path to calc however you like.
      e.g. Get-Childitem also allows glob matching, or Join-Path 'C:' 'W*s' 's*m3?' '*lc.*e' -resolve
      That's not even counting .net and regex.
      If you want to stop somebody running calc you'll have to deny their permissions on calc.
      Searching for files is a perfectly legitimate and useful feature of powershell.

  • @berryallen7005
    @berryallen7005 ปีที่แล้ว

    They turn their computer off

  • @stswebhusesele5626
    @stswebhusesele5626 ปีที่แล้ว

    obfoscation