AMSI Bypass Flashcards

1
Q

What is AMSI?

A

A Windows security feature that scans scripts (like PowerShell) for malicious code before they run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why bypass AMSI?

A

To run scripts (even legitimate ones) that might be flagged as malicious by AMSI’s detection rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patching AmsiScanBuffer

A

Modifying the AMSI function in memory to force it to always return “clean,” disabling scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Obfuscation (3 methods)

A

String Splitting: “Inv” + “oke-Mimikatz”.

Base64: Encoding commands to hide them.

XOR: Encrypting strings to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Alternative Execution (3 methods)

A

CLR: Running .NET code in PowerShell.

C# via PowerShell: Compiling C# code dynamically.

Unmanaged DLLs: Loading external libraries not scanned by AMSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tool is often blocked by AMSI?

A

Mimikatz (used for credential dumping). Example: Invoke-Mimikatz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does patching AmsiScanBuffer work?

A

AMSI can’t scan scripts if its core function is broken in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does obfuscation evade detection?

A

AMSI looks for exact malicious strings. Obfuscation hides those strings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why use unmanaged DLLs?

A

AMSI doesn’t scan code loaded from external DLLs, making them harder to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly