Serious Discussion Which security programs can detect and stop Metasploit's meterpreter shell?

SpyNetGirl

Level 3
Well-known
Jan 30, 2023
113
Interesting. I have some questions:
How do you know that the in-memory DLL injection is related to Meterpreter and not to another malware?
Which part of your solution detects reflective DLL loading? If I correctly remember, WDAC cannot cover all such techniques.
Did you test your solution against Meterpreter attacks started with exploits?

But you didn't ask the important question: How to get initial access?

So like I said, give me something I can test/run and I will post a video and show you.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,591
But you didn't ask the important question: How to get initial access?

We both know that initial access will be blocked in most cases and Meterpreter will not run. But this is prevention, not detection.
But there is no bullet-proof solution. WDAC and other hardening can be bypassed by skillful Blue Team (Red Team) and Meterpreter can be run.
The author of this thread mentioned somewhere that he want to stop the Red Team.

So like I said, give me something I can test/run and I will post a video and show you.

I cannot do such a thing. Meterpreter is used in the attack on the concrete network by using something like Metasploit. So, you can ask a Blue Team to attack your network or perform the attack by yourself.
 
Last edited:

SpyNetGirl

Level 3
Well-known
Jan 30, 2023
113
We both know that initial access will be blocked in most cases and Meterpreter will not run.

Well, there you go. Initial access is the most important part and something I usually see a lot of pentesters fail to consider, they just magically think the malware lands on a computer.

It's detection and prevention. You can't prevent something you can't detect. Things can get bulletproof when you use way too many security layers that compromise (think of zero days) of one or two of them at the same time will still keep you protected.

The article I linked to explains it all, it's something I compiled and refined overtime.

Almost all of the APTs successful attacks are the result of a bad administrator and misconfigured systems.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,591
Well, there you go. Initial access is the most important part and something I usually see a lot of pentesters fail to consider, they just magically think the malware lands on a computer.

That is true for pentesters but not for Blue Teams or Red Teams. WDAC and hardening cannot stop skillful teams.

It's detection and prevention. You can't prevent something you can't detect.

I can. For example, by disabling macros in documents, I can prevent any malware that would be downloaded and executed by this macro.
WDAC restrictions for scripts can prevent many malware, that could be downloaded and executed.
Of course, if the malware was not downloaded it could not be detected.

Almost all of the APTs successful attacks are the result of a bad administrator and misconfigured systems.

Mostly yes, but we have also attacks via exploits. Metasploit can be used in such attacks. It is probable that the author of this thread is in such a situation.

Edit.
I am not sure if our discussion is still on topic and interesting for the readers. Although I like to use/test WDAC and hardening, most users will never touch such solutions.
Anyway, if the author is ready then it would be interesting to see if your tight hardening could stop his Red Team.
 
Last edited:
F

ForgottenSeer 93475

Well, there you go. Initial access is the most important part and something I usually see a lot of pentesters fail to consider, they just magically think the malware lands on a computer.

It's detection and prevention. You can't prevent something you can't detect. Things can get bulletproof when you use way too many security layers that compromise (think of zero days) of one or two of them at the same time will still keep you protected.

The article I linked to explains it all, it's something I compiled and refined overtime.

Almost all of the APTs successful attacks are the result of a bad administrator and misconfigured systems.
hi SpyNetGirl
I was browsing your project on github a few days ago, I was really amazed at the amount of information I read there, Being a girl and doing this on your own is really amazing ( I am surprised because I am a girl too and have never seen this before )

Also, a lot of useful information and things there can be easily understood and are educational in nature, without all of them being complex terms that are difficult for ordinary people to understand

But just out of curiosity, why would you use feminine images, gestures, and symbols (some of them sexy) in a completely technical and complex project?

453243.png


Treat it as a girl to girl question and I appreciate it if you don't want to answer it in front of everyone or if it's your own thing 😊
 

Shadowra

Level 37
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,630
Reminds me of CobaltStrike... The file itself is recognized by antivirus engines (Eset calls it Rozena) but if you know how to modify the code (using encryption, XOR etc.), the antivirus won't detect anything, unless it behaves suspiciously...
 

Chuck57

Level 12
Verified
Top Poster
Well-known
Oct 22, 2018
591
I also find the information very interesting, and I've read and re-read much of this thread. Being on a Windows 10 Pro, with an old computer that lacks the necessary bits and pieces to run Win 11, I'm reading more to learn than to apply any of the software.

Keep this going. Lots of knowledge being posted.
 

Victor M

Level 13
Thread author
Verified
Top Poster
Well-known
Oct 3, 2022
645
If the machine is not yet compromised, then the attacker must convince the user to run the exploit or stager
I have read ( What is Meterpreter ? - Security Wiki ) that meterpreter is a payload which follows on in a exploit. I have tested it many moons ago. And it doesn't require user interaction.

If your machine is already compromised, then you should focus on the persistence method.
Yes, the red team has penetrated MalwareBytes Anti-exploit potection of apps mentioned in firewall rules. But since I am testing OpenEDR, it comes with Comodo Internet Security, which has Auto Containment. And all unknown exe's and some rarely used Windows exe's like attrib.exe, route.exe and conhost.exe are contained. I have not read that these 3 are LoL bin's, but they may be new undocumented ones. So, with Auto Containment, I am probably safe guarded from them trying to gain persistence. However, my guess is that they are using some reverse shell, and they can still copy documents and delete files without anything hampering them. And even without gaining persistence, they can re-exploit the firewall apps anytime to gain re-entry. OpenEDR also has Data Loss Prevention, but I haven't gotten to that feature yet.
 
Last edited:

danb

From VoodooShield
Verified
Top Poster
Developer
Well-known
May 31, 2017
1,742
I have read ( What is Meterpreter ? - Security Wiki ) that meterpreter is a payload which follows on in a exploit. I have tested it many moons ago. And it doesn't require user interaction.
This is true. Anyone remember DoublePulsar / EternalBlue? The PoC utilized Meterpreter, and parsing / blocking the command line for Rundll32 interrupted the attack in its earliest possible stage.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,591
I have read ( What is Meterpreter ? - Security Wiki ) that meterpreter is a payload which follows on in a exploit. I have tested it many moons ago. And it doesn't require user interaction.
You refer to my post where I wrote that your machine was compromised (you mentioned it in another thread). Your machine could be compromised with user interaction or without it. After the machine was compromised, the attacker could apply Meterpreter. If the attacker used Metasploit, then Meterpreter could be applied without user interaction.
If in your test you could run Meterpreter without user interaction then you probably did it by knowing user account credentials or(and) via exploit.

Yes, the red team has penetrated MalwareBytes Anti-exploit potection of apps mentioned in firewall rules. But since I am testing OpenEDR, it comes with Comodo Internet Security, which has Auto Containment. And all unknown exe's and some rarely used Windows exe's like attrib.exe, route.exe and conhost.exe are contained. I have not read that these 3 are LoL bin's, but they may be new undocumented ones. So, with Auto Containment, I am probably safe guarded from them trying to gain persistence. However, my guess is that they are using some reverse shell, and they can still copy documents and delete files without anything hampering them. And even without gaining persistence, they can re-exploit the firewall apps anytime to gain re-entry. OpenEDR also has Data Loss Prevention, but I haven't gotten to that feature yet.

Yes, it is possible when the Red Team can still exploit something in your network/system. Anyway, I never used OpenEDR, so I cannot say how tight are your settings.
 

Victor M

Level 13
Thread author
Verified
Top Poster
Well-known
Oct 3, 2022
645
Being on a Windows 10 Pro, with an old computer that lacks the necessary bits and pieces to run Win 11
You CAN install Windows 11 on older computers. You just have to follow this:

Boot the USB stick
Upon the first screen showing up. press SHIFT-F10, a cmd screen will open.
Start regedit
Find HKLM>System>Setup
New key: LabConfig
New Dword BypassTPMCheck = 1
New Dword BypassRAMCheck = 1
New Dword BypassSecureBootCheck = 1
Close regedit and continue.
 
  • Like
Reactions: simmerskool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top