- Content source
- https://youtu.be/A7HkFKebrvY
Edit.
I reposted a new video because in the old one, I forgot to mention that Memory integrity is disabled (incompatible Intel driver in Virtual Machine).
Last edited:
malwaretips.com
malwaretips.com
There are various UAC bypasses but the more you prolong the attack chain, the more likely it is to be intercepted by behavioural monitors. It will need to be tested as part of a real attack, for example, the script may write another encoded script (injector or something) to the registry and may try to bypass UAC.Kind of upsetting, administration privileges need to be hacked to run this kind of attack?, or human error, allowing by being deceived?
@Andy Ful may just force some big improvements across the industry.
No, this attack is not stealthy. It leaves a huge red X mark and someone will investigate why the antivirus service is off.However, it can probably be used as a part of targeted attacks in businesses.
Does not that automatically imply that Credential Guard and Virtualisation Based Security is disabled also (besides running SUA, probably the only defenses against your PoC)?Edit.
I reposted a new video because in the old one, I forgot to mention that Memory integrity is disabled (incompatible Intel driver in Virtual Machine).
No, this attack is not stealthy. It leaves a huge red X mark and someone will investigate why the antivirus service is off.
Does not that automatically imply that Credential Guard and Virtualisation Based Security is disabled also (besides running SUA, probably the only defenses against your PoC)?
Why are you surprised? Almost all AVs in the consumer space will fail. You were unnecessarily worried about Comodo. @Andy Ful explained the tests, how or why it’s not an issue for home users, and that Comodo is a strong suite. Appreciate the tests, disregard the pseudo-experts, and save yourself from the mind-numbing essays on Comodo. I think Kaspersky might survive the attack.Interesting it affects so many AVs.
Where is the test video? It's not there in the review segment.K. also failed hehe...
We wonder who you're aiming forAppreciate the tests, disregard the pseudo-experts, and save yourself from the mind-numbing essays on Comodo. I think Kaspersky might survive the attack.
I don't bother replying to them, ignoring their posts.We wonder who you're aiming for![]()
Thanks, although most home users have memory integrity enabled (is on by default, see link) also would protected processes prevent shutting doen the service?Credential Guard is not important in this method. The attack cannot work for drivers protected by VBS. I am not sure which Defender's drivers can be protected in that way.
I did not test how Memory Integrity can affect the attack. Anyway, Memory Integrity is often disabled in organizations due to some incompatible drivers.
They are all gonna fail because this seems to be based on how antivirus with all of its components is integrated and managed within Windows…K. also failed hehe...