Lets Go Around Defender with NativeDump

  Рет қаралды 1,008

Cyber Attack & Defense

Cyber Attack & Defense

Күн бұрын

Пікірлер: 11
@ohmsohmsohms
@ohmsohmsohms 5 ай бұрын
Another banger, starting out in pentesting/redteaming and ur really helping my methodology man. God bless you
@CyberAttackDefense
@CyberAttackDefense 5 ай бұрын
Glad my content is helping. Thanks for watching!
@BestITintelligence
@BestITintelligence 5 ай бұрын
Allways the BEST!!!!
@CyberAttackDefense
@CyberAttackDefense 5 ай бұрын
Thank you! Glad you like it.
@ryanpinga
@ryanpinga 5 ай бұрын
excellent rundown! keep them coming!
@CyberAttackDefense
@CyberAttackDefense 5 ай бұрын
Thanks! Will do. Anything in particular you want to see?
@ferassami3362
@ferassami3362 5 ай бұрын
Can you share your experience with the protected process concept RunAsPPl , even Native Dump cant work with it
@CyberAttackDefense
@CyberAttackDefense 5 ай бұрын
Ah RunAsPPL is only a good step where you can’t use credential guard. It can be defeated with rogue drivers. Mimikatz has a feature to unprotect a process by using !processprotect this does require the mimidrv.sys. If you cripple Defender or other EDR protected processes can be reversed.
@neotokyo98
@neotokyo98 5 ай бұрын
could u do a video on coff loader using it to do a threadless injectio and bypassing defender dont know if itll get flagged but was curious to see how itll pan out
@CyberAttackDefense
@CyberAttackDefense 5 ай бұрын
Last time I tried coff loader it got caught but sure. I can give it a shot.
@neotokyo98
@neotokyo98 5 ай бұрын
@@CyberAttackDefense ya give it a shot i wanted to see how itll work
Deceptive Cyber Tactics: Deceiving Responder
19:45
Cyber Attack & Defense
Рет қаралды 821
Adversaries Are Doing Stranger Things Part 1
21:20
Cyber Attack & Defense
Рет қаралды 1,6 М.
УЛИЧНЫЕ МУЗЫКАНТЫ В СОЧИ 🤘🏻
0:33
РОК ЗАВОД
Рет қаралды 7 МЛН
Caleb Pressley Shows TSA How It’s Done
0:28
Barstool Sports
Рет қаралды 60 МЛН
Ozoda - Alamlar (Official Video 2023)
6:22
Ozoda Official
Рет қаралды 10 МЛН
Hide And Seek With Active Directory: Secrets For Persistence and Deception
12:32
Cyber Attack & Defense
Рет қаралды 1,6 М.
Does Multi-Factor Authentication Stop Phishing in 2024?
17:31
Cyber Attack & Defense
Рет қаралды 1,1 М.
We may have killed p10k, so I found the perfect replacement.
19:48
Dreams of Autonomy
Рет қаралды 201 М.
Using Cloudflared for Tunneling and Persistence
27:29
Cyber Attack & Defense
Рет қаралды 861
Certipy and ADCSync attacks against Active Directory Certificate Services
22:22
Cyber Attack & Defense
Рет қаралды 3,5 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 288 М.
Embedded Rust setup explained
23:03
The Rusty Bits
Рет қаралды 97 М.
Adversaries Are Doing Stranger Things Part 3
22:35
Cyber Attack & Defense
Рет қаралды 928
Debugging the Linux Kernel
39:11
Write your own Operating System
Рет қаралды 2,8 М.
УЛИЧНЫЕ МУЗЫКАНТЫ В СОЧИ 🤘🏻
0:33
РОК ЗАВОД
Рет қаралды 7 МЛН