• XSS.stack #1 – первый литературный журнал от юзеров форума

Edr bypass process

The main question is, what tool are you want to use for bypassing antimalware defenses, something coded by "who knows" or a tool that offers evasive options and capabilities made for evasion purposes?

After you answer that question, I think you should start reading something like this:


Study C/C++/Nim/Rust, any low level language will be great, learn how EDRs work, learn different methods to execute shellcode, obfuscation, encryption... From there you can go further and start on the journey.


There is not a magic link/book/project, you must spend time reading the latest conferences, learning about windows internal, and showing interest for all the concepts that involves bypassing an antivirus or endpoint protection and response system.


My advice: DLL sideloading, retrieve shellcode from outside the binary/dll, decrypt in memory, don't use RWX permission, obfuscate commons strings, use a good malleable c2 that mimics chrome/teams or similar app with high HTTP traffic, use moneta and PE-Sieve to see if you are clean on memory, sleep times, metadata of the payload, check for debugers, anti sandbox, module stomping technique, indirect syscalls, steganography, etc...


My advice, learn to code, at least build your own shellcode loader, from there you keep upgrading yourself. One day you will be living on Kernel, always think big :)
 
Последнее редактирование:
Study C/C++/Nim/Rust, any low level language will be great, learn how EDRs work, learn different methods to execute shellcode, obfuscation, encryption... From there you can go further and start on the journey.

My advice: DLL sideloading, retrieve shellcode from outside the binary/dll, decrypt in memory, don't use RWX permission, obfuscate commons strings, use a good malleable c2 that mimics chrome/teams or similar app with high HTTP traffic, use moneta and PE-Sieve to see if you are clean on memory, sleep times, metadata of the payload...

My advice, learn to code, at least build your own shellcode loader, from there you keep upgrading yourself. One day you will be living on Kernel, always think big :)
Thanks for your advice, that was helpful ❤️
 
I'm studying some way to use MPclient.dll to bypass Win Defender.
Maybe, you could get and study the Sophos DLLs then try to use them to bypass.
I really dont know how effective does it is but the idea is find out some feature offered by own Sophos DLLs.
 
Hey guys
i want to analyze and bypass Sophos edr and so i check it a little.
My question is do i have a checklist for that or just focus on one functionality of that such as unhooking?
It's the first time that i want to do it

I want to know how to approach that?
You should understand how Sophos is detecting you/your payload, once you realize what is detecting your payload its more clear what you have to do in order to bypass it.

For a general knowledge of how to bypass x or y EDR, i recommend that you get a free trial at elastic, enable all rules and full prevention and see which rules your payload is triggering.

As Бафомет said, you can mimic another payloads that were successfully at bypassing EDR products, take a look at abuse[.]ch and virustotal[.]com.
 
Looking for you advice guys. Is it possible to know/buy a list of IP addresses which belongs to particularly AV/EDR? How to know IP addresses which are used by servers of NORD32's antivirus for example....

yes AS50881 etc. competent EDR vendors do networked and non-networked dynamic analysis in their sandbox tho, and by default everything is sent to the sandbox. it wont help u much. the only solution is better malware.
 
yes AS50881 etc. competent EDR vendors do networked and non-networked dynamic analysis in their sandbox tho, and by default everything is sent to the sandbox. it wont help u much. the only solution is better malware.
First of all,
AS50881 - thanks for it
Will you kindly share other abbreviation such as AS50881 which belong to other products? I will be thankful....
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх