Closed B0r3dS3c closed 2 years ago
thanks for your test, I think running some of these assembles bins is not that possible, but I will do some testing later, in both ways can you share with me some screenshots of your testing results for BitDefender,Norton like doing mimikatz or meterpreter
Thanks for your response, hope that you find a way to make it work! 😊
Sadly Bitdefender then blocks the access to lsass. I didn't find a way to bypass that restriction.
The only change i have made in the code of the AggresorBD2.DLL, is in the stealth call:
C:\Program Files\Palo Alto Networks\Traps\CyveraConsole.exe
to C:\Program Files\Bitdefender\Bitdefender Security\bdservicehost.exe
I think Bitdefender can prevent access to lsass. mortar is not designed to bypass hooks while it is made to load bins into memory. would be better if you tried also meterpreter/CS so I can include that into my research.tnx
The meterpreter session works perfectly, it gets detected by bitdefender but it still keeps on running
Even the Mimikatz module doesn't get detected or blocked 😉
thanks for the testing, please tag me on Twitter with your results. @zux0x3a
But i still have a question, is there a way where we could apply this technique to other tools that run once, such as WinPEAS or PowerUp?
Did you find any way to make this work? I think you closed this issue by mistake.
i will make it open until has some results in my pocket, thanks for your testing
mortar loader can't support loading assemblies into memory, I would suggest using functions such as execute-assemblies within cobalt-strike or alternative.
Hi, please when someone sees that reply contact me via mail or just reply here, I kind of need help with one of the tools you mentioned here. Thanks 🙏
Hi, this works amazingly well with mimikatz against multiple antivirus products that i have tested. (Windows Defender, McAfee, Eset, Norton, Bitdefender and Avast)
But i still have a question, is there a way where we could apply this technique to other tools that run once, such as WinPEAS or PowerUp?