Windows Command-Line Obfuscation
Por um escritor misterioso
Descrição
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due to the number of variations. This post shows how more than 40 often-used, built-in Windows applications are vulnerable to forms of command-line obfuscation, and presents a tool for analysing other executables.
Deconstructing PowerShell Obfuscation in Malspam Campaigns
AMSI Bypass Methods Pentest Laboratories
De-obfuscate/Decode Files or Information - Red Team Notes 2.0
Powershell Obfuscation Demystified Series Chapter 2: Concatenation
PowerShell Obfuscation: Stealth Through Confusion, Part I
Invoke-Obfuscation – Liam Cleary [MVP Alumni and MCT]
Use command line
PowerShell Obfuscation: Stealth Through Confusion, Part I
hacking-material-books/obfuscation/simple_obfuscation.md at master
hacking-material-books/obfuscation/simple_obfuscation.md at master
Emotet Is Not Dead (Yet) – Part 2 - VMware Security Blog - VMware
Invoke-Obfuscation — Hiding Payloads To Avoid Detection
CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How
Commandline Obfusaction - Red Team Notes
de
por adulto (o preço varia de acordo com o tamanho do grupo)