Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,654
In March and April 2024, I presented a series of videos about bypassing AV solutions:
I reported the attack method with all details to any interested AV vendor (Microsoft in the first place). Microsoft documented the method well a few years ago, although not for malicious actions. I discovered it when working on the WHHLight application, which uses custom WDAC policies. The attack method uses the Windows built-in security mechanism, which is why I could bypass all tested security solutions. For security reasons, I did not publish the details of the method. Now, other researchers have published the details:
Edit.
Post updated. I changed the source article and citation.
App Review - The Comodo's challenge.
App Review - Comodo's challenge part 2.
App Review - Eset's challenge.
App Review - Microsoft Defender's challenge.
App Review - Bitdefender's challenge.
App Review - The Zone Alarm challenge.
App Review - The Emsisoft Enterprise Security challenge.
App Review - Avast's challenge.I reported the attack method with all details to any interested AV vendor (Microsoft in the first place). Microsoft documented the method well a few years ago, although not for malicious actions. I discovered it when working on the WHHLight application, which uses custom WDAC policies. The attack method uses the Windows built-in security mechanism, which is why I could bypass all tested security solutions. For security reasons, I did not publish the details of the method. Now, other researchers have published the details:
- WDAC as a Way to Impair Security Defenses — Cybersecurity researchers have devised a new attack technique that leverages a malicious Windows Defender Application Control (WDAC) policy to block security solutions such as Endpoint Detection and Response (EDR) sensors following a system reboot. "It makes use of a specially crafted WDAC policy to stop defensive solutions across endpoints and could allow adversaries to easily pivot to new hosts without the burden of security solutions such as EDR," researchers Jonathan Beierle and Logan Goins said. "At a larger scale, if an adversary is able to write Group Policy Objects (GPOs), then they would be able to distribute this policy throughout the domain and systematically stop most, if not all, security solutions on all endpoints in the domain, potentially allowing for the deployment of post-exploitation tooling and/or ransomware."
Edit.
Post updated. I changed the source article and citation.
Last edited: