{"id":3452,"date":"2024-05-14T13:37:19","date_gmt":"2024-05-14T11:37:19","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=3452"},"modified":"2024-09-13T15:37:51","modified_gmt":"2024-09-13T13:37:51","slug":"simple-anti-virus-bypass-with-mimikatz","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/simple-anti-virus-bypass-with-mimikatz\/","title":{"rendered":"Simple Anti-Virus Bypass with Mimikatz"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2024\/05\/mimikatz-bypass-defender.png&#8221; alt=&#8221;Mimikatz modified to bypass Defender (AI image)&#8221; title_text=&#8221;mimikatz-bypass-defender&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">This short article presents the update of the script created based on the excellent <a href=\"https:\/\/www.blackhillsinfosec.com\/bypass-anti-virus-run-mimikatz\/\" target=\"_blank\" rel=\"noopener\" title=\"Anti-virus detection Bypass with Mimikatz\">Black Hills<\/a> article: &#8220;naive&#8221; or configured to be lax Anti-Virus often relies on signatures, which can be easily circumvented like demonstrated in the initial article.<\/p>\n<p style=\"text-align: justify;\">During a recent <a href=\"https:\/\/www.dsecbypass.com\/en\/internal-pentest\/\" title=\"Internal IT security audit\">internal pentest<\/a>, our auditor retested this technique on a recent version of Windows Defender configured too permissively and managed to bypass it to run their modified version of the offensive script.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;tamper&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"part\" data-startline=\"14\" data-endline=\"14\">The issue<\/h2>\n<p style=\"text-align: justify;\">The initial script was released in January 2017. When the pentester tried to run the modified PowerShell code from Invoke-Mimikatz, an error like this was returned:<\/p>\n<pre style=\"text-align: justify;\">Exception calling \"GetMethod\" with \"1\" argument(s): \"Ambiguous match found.\"<\/pre>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">A quick search identified an easy fix to Invoke-Mimikatz: <a href=\"https:\/\/github.com\/mitre\/caldera\/issues\/38#issuecomment-396055260\">https:\/\/github.com\/mitre\/caldera\/issues\/38#issuecomment-396055260<\/a><\/p>\n<p style=\"text-align: justify;\">Furthermore, the initial Black Hills script replaces the strings detected by Defender with other fixed strings. The consultant therefore modified the script to generate a random sequence of characters each time the script was executed.<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;postprocess&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>The script<\/h2>\n<p style=\"text-align: justify;\">The following script is a simple update of the original script in order to respond to the problems encountered by the pentester during his intrusion test.<\/p>\n<p><script src=\"https:\/\/gist.github.com\/vtoutain\/658490c12127c26083e58745b37b67ec.js\"><\/script><\/p>\n<p style=\"text-align: justify;\">\n<p style=\"text-align: justify;\">\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>\ud83d\udee1\ufe0f DSecBypass supports you with your <a href=\"https:\/\/www.dsecbypass.com\/en\/internal-pentest\/\" title=\"Perform an internal penetration test\">internal penetration tests<\/a>. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\">contact <\/a>us for additional information and\/or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This short article presents the update of the script created based on the excellent Black Hills article: &#8220;naive&#8221; or configured to be lax Anti-Virus often relies on signatures, which can be easily circumvented like demonstrated in the initial article. During a recent internal pentest, our auditor retested this technique on a recent version of Windows [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-3452","post","type-post","status-publish","format-standard","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=3452"}],"version-history":[{"count":15,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3452\/revisions"}],"predecessor-version":[{"id":3637,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3452\/revisions\/3637"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=3452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=3452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=3452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}