In the seventh video in our series on Red Team Techniques we will explore Defense Evasion in Windows. We will cover how to use tools to evade Anti-Virus systems, scripting through PowerShell, and more.
0:40 What We’ll Be Covering
1:30 Defense Evasion
2:32 AV Detection Techniques
6:00 AV Evasion Techniques
8:50 MITRE Attack Defense Evasion
9:30 Defense Evasion with the Invoke Obfuscation Module
10:08 Why Should You Use PowerShell?
11:18 How to Install PowerShell on Kali
11:35 How to Use PowerShell on Kali
11:57 How to Use the Invoke-Obfuscation Module
20:05 How to Use AST Obfuscate PowerShell Nodes
23:49 How to Use Shellter
32:05 How to Transfer the Exploit to the Target System
34:12 How to Run the Exploit on the Target System
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Windows Defense Evasion Techniques.
Learn more about HackerSploit.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; @HackerSploit ;