• XSS.stack #1 – первый литературный журнал от юзеров форума

Powershell Empire 4

Пожалуйста, обратите внимание, что пользователь заблокирован
PowerShell Empire взял на себя BC-SECURITY.


Thanks for info. I was not aware it survived.

How to FUD the stager and everything? Is it recommended? Already know how to setup the infrastructure. Whats the next step? What are the negatives compared to cobalt strike? Thx

I have not use the new PSE software, so I do not know if the output is detected by AV without more modification. I suspect static detection is fine, but dynamic analysis will detect easily because there's lots of suspicious things, i.e. powershell.exe > Hidden/Decode B64 > Download etc...

If you want to spread, you will also need to embed it into something like Office document with the __launcher__ command. If not already checked, read https://www.powershellempire.com/?page_id=104 to see if it helps
 
Thanks for info. I was not aware it survived.



I have not use the new PSE software, so I do not know if the output is detected by AV without more modification. I suspect static detection is fine, but dynamic analysis will detect easily because there's lots of suspicious things, ie powershell.exe> Hidden / Decode B64> Download etc ...

If you want to spread, you will also need to embed it into something like Office document with the __ launcher__ command. If not already checked, read https://www.powershellempire.com/?page_id=104 to see if it helps
ok thx
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх