Section 17: Detection Avoidance Flashcards
Command to create a windows user and add it to an admin group
net user /add hacked Hacked123
net localgroup administrators hacked /add
Code Injection
Exploit technique that runs malicious code with the identification number of a legitimate process
Masquerading
Occurs when the dropper replaces a genuine executable with a malicious one
Stream Editor (SED)
Has the ability to search, find, delete, replace, insert, or edit anything inside of a file without the need to open that file
▪ sed -i ‘malware’ /var/log/auth.log
Commands to erase history
Bash (erase history)
● echo “ ” > ~.bash_history
history -c
PowerShell
● Clear-History
Empire
A C2 framework that uses PowerShell for common post exploitation tasks
▪ github.com/bc-security/empire
▪ Nowadays, most Empire tools and techniques can be detected by
antivirus tools
BloodHound
A tool used to explore Active Directory trust relationships and abuse rights on AD objects