Windows Defense Evasion Techniques | Red Team Series 7-12
In the seventh video in our series on Red Team Techniques we will explore Defense Evasion in Windows. We will cover how to use tools to evade Anti-Virus systems, scripting through PowerShell, and more.
0:40 What We’ll Be Covering
1:30 Defense Evasion
2:32 AV Detection Techniques
6:00 AV Evasion Techniques
8:50 MITRE Attack Defense Evasion
9:30 Defense Evasion with the Invoke Obfuscation Module
10:08 Why Should You Use PowerShell?
11:18 How to Install PowerShell on Kali
11:35 How to Use PowerShell on Kali
11:57 How to Use the Invoke-Obfuscation Module
20:05 How to Use AST Obfuscate PowerShell Nodes
23:49 How to Use Shellter
32:05 How to Transfer the Exploit to the Target System
34:12 How to Run the Exploit on the Target System
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Windows Defense Evasion Techniques.
Learn more about HackerSploit.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; @HackerSploit ;
Windows Red Team Credential Access Techniques | Red Team Series 6-12
You might also like…
Intrusion Detection with Suricata – Blue Team Series with HackersploitIn this video, we'll cover the process of installing, configuring, and using Suricata for intrusion detection.
UFW Full Tutorial | HackerSploit Linux SecurityIn this video, HackerSploit will show how UFW is used through the command line, allowing you to make firewall configurations easy.
Monitor in Real-Time with OSSEC See What’s Taking Place in Your ServerIn part 6 of Blue Team training, we'll cover Intrusion detection with OSSEC, an open-source, host-based intrusion detection system.
Discover Docker Security EssentialsNew Docker ebook, Kubernetes v1.21.1 support, Terraform resources