Viewing 8 posts - 1 through 8 (of 8 total)
  • Author
    Posts
  • #40236
    Kayoh
    Participant

    Followed the course instructions, and created a Listener http, then made the .bat file which is undetectable to windows defender, ran it on the target computer but I get no connection on Empire? no active agents.

    any ideas?

    #40282
    Diego PérezDiego Pérez
    Moderator

    Hi!
    Can you share a screenshot of:
    1. Result of ​ifconfig and route -n ​in Kali.
    2. The result of ipconfig in Windows.
    3. The options used for the listener and for the stager.
    4. Can you share a screenshot of the Network settings used in VirtualBox for both machines.

    Also try to disable defender and try the attack again.

    Let me know.
    Diego

    #40292
    Kayoh
    Participant

    Hi Diego,

    uploaded all of the pictures you’ve requested to imgur, if you click the image below it should show all pictures

    View post on imgur.com

    Hope this helps.

    I don’t get any messages from Windows Defender when running the .bat file so i don’t think it blocks it.

    #40398
    Diego PérezDiego Pérez
    Moderator

    Hi!
    Thanks.
    Can you disable defender and see if the conection back success?

    Let me know how it goes!
    Diego

    #40432
    Kayoh
    Participant

    The connection works when Windows Defender is disabled. Windows Defender doesn’t block it or notice its a malicious file, why would it block the outgoing connection?

    Would i have to rely on Veil, Empire or TheFatRat to create something that would give me a connection if windows defender is enabled?

    #40471
    Diego PérezDiego Pérez
    Moderator

    Hi!

    Defender is also watching outgoing connections so it may prevent it from connecting. You can try to use a common port like 80 but you won’t be able to use apache server as 2 apps can’t use the same port at the same time.
    Basically bypassing AV programs is like a game of cat and mouse, so backdoors might start getting detected at some stage, then the developers release an update, this will allow you to generate undetectable backdoors, then AV programs release an update which will make backdoors detectable ……..

    So the main thing is to make sure that Veil or any other tool you’re using to generate the backdoor is up to date.​​

    Here’s a few solutions to try if your backdoor is getting detected:

    1. Make sure that you have the latest version of Veil, so do ​updated ​before doing ​use 1.

    ​2. Experiment with different payloads, and experiment with different payload options and you should be able to bypass it.​

    3. Try generating a backdoor using the fat rat, empire.

    4. Modify backdoor code if its in bat as shown in lecture 33.

    5. Modify backdoor using a hex editor as shown in lecture 40.

    6. Create your own backdoor (covered in python course).

    The best thing to do is look at the last lecture of the course (bonus lecture) it contains all the courses that you can take with this course and a comparison between them.
    Hope it helps!
    Diego

    #40480
    Kayoh
    Participant

    Thanks a lot for the help, i will keep trying and testing see if i can figure it out.

    #40511
    Diego PérezDiego Pérez
    Moderator

    Hi!
    Cool, experimenting is the best way to learn.

    Greetings!
    Diego

Viewing 8 posts - 1 through 8 (of 8 total)
  • You must be logged in to reply to this topic.