Let me first start by saying I will not be revealing in this post any novel techniques or new research that hasn’t been seen before. I will, however, reveal my own methodology when it comes to finding gaps in EDRs visibility in order to bypass detection.
Powershell can be a powerful tool during the post-exploitation phase of our engagements. But what if AMSI will not let us use any of its capabilities?
Enter your email address to receive cyber security tips, techniques, and updates
Email: contact@shorsec.io
Phone: +972 50 270 0888
powered by nextbracket.io