How To ByPass Windows Defender and Elastic Security With PowerCat! WORKS!
ฝัง
- เผยแพร่เมื่อ 27 ก.ย. 2024
- Is it possible to bypass windows defender and elastic security at the same time with a powercat reverse shell?
The best purple teaming series on youtube with real hands on learning for everyone!
For educational purposes only!
Subscribe and like for more!
Connect with me on linkedin: / howard-mukanda-24503144
Follow me on twitter: / lahilabs
Powercat is "..Powershell Netcat which is a new version of netcat in the form of the powershell script" : www.hackingart... and can be found on github: github.com/bes... Connect and Direct Message me on Linkedin: / howard-mukanda-24503144
Thanks for this walk-through. The hair cut looks good on you.
Thank you
really love this type of videos, Can you do detection videos of lolbins pls
Loved It!
can the attacker be a machine on the cloud
Can you bypass with meterpreter payload ?
Give us more real life practical examples
I could, bypass it, meaning the payload stayed on disk but behavioral detection is a beast! I am taking more courses to work on more custom implants
@@ITSecurityLabs defender wasn't complaining because there is a powershell window opened
Is it possible to use the msfconsole to setup the listener for this power cat exploit and could you please make a video?
What cve is this?
Zero day lol
It will not be detected and blocked by defender immediately once the encoded file will be decoded to execute it? How's that work then?
In domain enviroments it's anyway all more restricted
I was able to run it for a while. Yes in domain environments you might have things like applocker, constrained powershell etc
Please just don't close any function of Microsoft defender and than try to penetrate it you can also add some AVs IDS firewall on top of it
Are you dumb
You are telling to enable sample submission to make fud malware into known one
Seriously
Love this new series mate
This is the fun stuff 👍
@@ITSecurityLabs looking forward for more fun with av