SlideShare a Scribd company logo
BASIC METERPRETER EVASION
By: Nipun Jaswal
• TechnicalDirector, Pyramid Cyber and Forensics
• Chair Member, National Cyber Defense and Research Center
• Author of Mastering Metasploit & Metasploit Bootcamp
• 10+ Years into IT Security
• Author of Mastering Metasploit , First, Second,
CN Edition & “Metasploit Bootcamp”
• Technical Director , Pyramid Cyber and
Forensics
• Chair member, National Cyber Defense and
Research Center
• Known for Exploit Research, Cyber
Surveillance, Cyber Warfare, Wireless
Hacking & Exploitation and Hardware
Hacking
• Can code in 15+ programming languages, 20
Hall of fames including Offensive Security,
AT&T, Facebook, Apple etc
• Worked Globally with various law
enforcement agencies
#WHOAMI
WHAT WE WILL LEARN TODAY?
BYPASS SIGNATURE DETECTION
• Changing the Known Signatures
for Malware
• Making use of Shell code instead
of conventional executables
• Using Encoding wrappers for
bypassing detections
BYPASS DYNAMIC ANALYSIS
• Using SSL to defeat Network
behavior analysis
• Using Popular yet self signed
certificates to whitelist
communication
• Using Microsoft utilities to bypass
application whitelisting
TOP 3 ANTIVIRUS SOLUTIONS
TYPES OF DETECTION
Common Detection Types:
• Signature Based Detection
• Dynamic Analysis / Behavioral Detection
BYPASSING
LET’S CREATE A BACKDOOR WITH
METASPLOIT…
FAILED SIGNATURE DETECTION…
LET’S TRY A .VBS SCRIPT…
FAILED SIGNATURE DETECTION…YET AGAIN
LET’S CHECK AV
DETECTION STATUS…
• 30/39 AVS DETECT THE
BACKDOOR AS
MALICIOUS
• HOW CAN WE
CIRCUMVENT THIS?
LET’S BYPASS SIGNATURE DETECTION WITH
CUSTOMIZED EXECUTABLE
LET’S BYPASS SIGNATURE DETECTION WITH
CUSTOMIZED EXECUTABLE (CONT.)
LET’S BYPASS SIGNATURE DETECTION WITH
CUSTOMIZED EXECUTABLE (CONT.)
LET’S BYPASS SIGNATURE DETECTION WITH
CUSTOMIZED EXECUTABLE (CONT.)
LET’S BYPASS SIGNATURE DETECTION WITH
CUSTOMIZED EXECUTABLE (CONT.)
Let’s check AV Detection
status…
• 3/39 AVs detect the
backdoor as malicious
• By simply replacing the
executable by
shellcode we dropped
27 antivirus detections
LET’S SEE WHAT 360 HAVE TO SAY…
TYPES OF DETECTION
Common Detection Types:
• Signature Based Detection
• Dynamic Analysis / Behavioral Detection
LET’S EXECUTE THE APPLICATION…
TYPES OF DETECTION
Common Detection Types:
• Signature Based Detection
• Dynamic Analysis / Behavioral Detection
TOP 3 ANTIVIRUS SOLUTIONS
BYPASSING
AVAST IS A TOUGH NUT TO CRACK…
USING SSL TO BYPASS AVAST NETWORK
DETECTION
USING SSL TO BYPASS AVAST NETWORK
DETECTION
USING SSL TO BYPASS AVAST NETWORK
DETECTION
USING SSL TO BYPASS AVAST NETWORK
DETECTION
Let’s check AV Detection
status…
• 0/39 AVs detect the
backdoor as malicious
• By simply adding
support for SSL and
using Google’s SSL Cert
(Self Signed) we
dropped rest of the 3 as
well
SUCCESS ON AVAST
SUCCESS ON AVAST
TOP 3 ANTIVIRUS SOLUTIONS
BYPASSING
NORTON WILL TAKE YOUR NIGHTS AWAY
Why I Have rated Norton as one of
the Best AV Solutions out there?
• Aggressive Firewall
• Aggressive Behavior Detection
• File Info based Blocking / File
Attributes
• Application Memory and CPU
Consumption
WHAT DOES IT TAKE TO BYPASS NORTON?
• Fake SSL Certificate
• Application Whitelisting
Method
• Delays and Continuous
Process Consumption, but
not too high.
• Patience
THANKS
• For More Information on AV Evasion, refer to “Metasploit
Bootcamp” & “Mastering Metasploit”
• Twitter : @nipunjaswal
• FB : @nipunjaswal
• Linknd : @nipunjaswal
• http://Amazon.com/authors/nipunjaswal

More Related Content

PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
PDF
Ground Zero Training- Metasploit For Web
PDF
Hijacking Softwares for fun and profit
PDF
When the internet bleeded : RootConf 2014
PDF
Stranger Danger (NodeSummit, 2016)
PPTX
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Ground Zero Training- Metasploit For Web
Hijacking Softwares for fun and profit
When the internet bleeded : RootConf 2014
Stranger Danger (NodeSummit, 2016)
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Elizabeth Lawler - Devops, security, and compliance working in unison

What's hot (20)

PDF
Network Forensics and Practical Packet Analysis
PDF
Security by Weston Hecker
PDF
Hacking Web Apps by Brent White
PPTX
Cyber Security and Open Source
PPTX
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
PPTX
Cybereason - behind the HackingTeam infection server
PDF
'Malware Analysis' by PP Singh
PPTX
GreyNoise - Lowering Signal To Noise
PDF
DevSecCon London 2017: Hands-on secure software development from design to de...
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PDF
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
PPTX
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
PDF
What you need to know about ExPetr ransomware
PDF
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
PDF
Your internet-exposure-that-makes-you-vulnerable
PDF
There’s an OpenBullet Attack Config for Your Site – What Should You Do?
PPTX
How to-become-secure-and-stay-secure
PDF
Dev secops on the offense automating amazon web services account takeover
PPTX
Web Application Security - DevFest + GDay George Town 2016
PDF
Threat detection with 0 cost
Network Forensics and Practical Packet Analysis
Security by Weston Hecker
Hacking Web Apps by Brent White
Cyber Security and Open Source
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Cybereason - behind the HackingTeam infection server
'Malware Analysis' by PP Singh
GreyNoise - Lowering Signal To Noise
DevSecCon London 2017: Hands-on secure software development from design to de...
How to Protect Yourself From Heartbleed Security Flaw
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
What you need to know about ExPetr ransomware
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Your internet-exposure-that-makes-you-vulnerable
There’s an OpenBullet Attack Config for Your Site – What Should You Do?
How to-become-secure-and-stay-secure
Dev secops on the offense automating amazon web services account takeover
Web Application Security - DevFest + GDay George Town 2016
Threat detection with 0 cost
Ad

Similar to Basics of Meterpreter Evasion (20)

PDF
Bypassing Antivirus for effective security
PPTX
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
ODP
2600 av evasion_deuce
PDF
The Art of AV Evasion - Or Lack Thereof
PPTX
Evading Antivirus software for fun and profit
PPTX
Let's Talk Technical: Malware Evasion and Detection
PDF
Cansecwest - The Death of AV defence in depth
PDF
Modern Evasion Techniques
PDF
AV Evasion with the Veil Framework
PDF
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
PPTX
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
PPT
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
PDF
Bitdefender - Solution Paper - Active Threat Control
PDF
Copy of Gradient Minimalist Business Slides.pdf
PDF
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
PDF
Bypass_AV-EDR.pdf
PPTX
Unit 5 - Windows Credential Attacks.pptx
PDF
Symbolic Execution of Malicious Software: Countering Sandbox Evasion Techniques
PDF
In search of unique behaviour
PDF
2017-BSidesCharm-DetectingtheElusive-ActiveDirectoryThreatHunting-Final.pdf
Bypassing Antivirus for effective security
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
2600 av evasion_deuce
The Art of AV Evasion - Or Lack Thereof
Evading Antivirus software for fun and profit
Let's Talk Technical: Malware Evasion and Detection
Cansecwest - The Death of AV defence in depth
Modern Evasion Techniques
AV Evasion with the Veil Framework
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
Bitdefender - Solution Paper - Active Threat Control
Copy of Gradient Minimalist Business Slides.pdf
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
Bypass_AV-EDR.pdf
Unit 5 - Windows Credential Attacks.pptx
Symbolic Execution of Malicious Software: Countering Sandbox Evasion Techniques
In search of unique behaviour
2017-BSidesCharm-DetectingtheElusive-ActiveDirectoryThreatHunting-Final.pdf
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development

Basics of Meterpreter Evasion

  • 1. BASIC METERPRETER EVASION By: Nipun Jaswal • TechnicalDirector, Pyramid Cyber and Forensics • Chair Member, National Cyber Defense and Research Center • Author of Mastering Metasploit & Metasploit Bootcamp
  • 2. • 10+ Years into IT Security • Author of Mastering Metasploit , First, Second, CN Edition & “Metasploit Bootcamp” • Technical Director , Pyramid Cyber and Forensics • Chair member, National Cyber Defense and Research Center • Known for Exploit Research, Cyber Surveillance, Cyber Warfare, Wireless Hacking & Exploitation and Hardware Hacking • Can code in 15+ programming languages, 20 Hall of fames including Offensive Security, AT&T, Facebook, Apple etc • Worked Globally with various law enforcement agencies #WHOAMI
  • 3. WHAT WE WILL LEARN TODAY? BYPASS SIGNATURE DETECTION • Changing the Known Signatures for Malware • Making use of Shell code instead of conventional executables • Using Encoding wrappers for bypassing detections BYPASS DYNAMIC ANALYSIS • Using SSL to defeat Network behavior analysis • Using Popular yet self signed certificates to whitelist communication • Using Microsoft utilities to bypass application whitelisting
  • 4. TOP 3 ANTIVIRUS SOLUTIONS
  • 5. TYPES OF DETECTION Common Detection Types: • Signature Based Detection • Dynamic Analysis / Behavioral Detection
  • 7. LET’S CREATE A BACKDOOR WITH METASPLOIT…
  • 9. LET’S TRY A .VBS SCRIPT…
  • 11. LET’S CHECK AV DETECTION STATUS… • 30/39 AVS DETECT THE BACKDOOR AS MALICIOUS • HOW CAN WE CIRCUMVENT THIS?
  • 12. LET’S BYPASS SIGNATURE DETECTION WITH CUSTOMIZED EXECUTABLE
  • 13. LET’S BYPASS SIGNATURE DETECTION WITH CUSTOMIZED EXECUTABLE (CONT.)
  • 14. LET’S BYPASS SIGNATURE DETECTION WITH CUSTOMIZED EXECUTABLE (CONT.)
  • 15. LET’S BYPASS SIGNATURE DETECTION WITH CUSTOMIZED EXECUTABLE (CONT.)
  • 16. LET’S BYPASS SIGNATURE DETECTION WITH CUSTOMIZED EXECUTABLE (CONT.)
  • 17. Let’s check AV Detection status… • 3/39 AVs detect the backdoor as malicious • By simply replacing the executable by shellcode we dropped 27 antivirus detections
  • 18. LET’S SEE WHAT 360 HAVE TO SAY…
  • 19. TYPES OF DETECTION Common Detection Types: • Signature Based Detection • Dynamic Analysis / Behavioral Detection
  • 20. LET’S EXECUTE THE APPLICATION…
  • 21. TYPES OF DETECTION Common Detection Types: • Signature Based Detection • Dynamic Analysis / Behavioral Detection
  • 22. TOP 3 ANTIVIRUS SOLUTIONS
  • 24. AVAST IS A TOUGH NUT TO CRACK…
  • 25. USING SSL TO BYPASS AVAST NETWORK DETECTION
  • 26. USING SSL TO BYPASS AVAST NETWORK DETECTION
  • 27. USING SSL TO BYPASS AVAST NETWORK DETECTION
  • 28. USING SSL TO BYPASS AVAST NETWORK DETECTION
  • 29. Let’s check AV Detection status… • 0/39 AVs detect the backdoor as malicious • By simply adding support for SSL and using Google’s SSL Cert (Self Signed) we dropped rest of the 3 as well
  • 32. TOP 3 ANTIVIRUS SOLUTIONS
  • 34. NORTON WILL TAKE YOUR NIGHTS AWAY Why I Have rated Norton as one of the Best AV Solutions out there? • Aggressive Firewall • Aggressive Behavior Detection • File Info based Blocking / File Attributes • Application Memory and CPU Consumption
  • 35. WHAT DOES IT TAKE TO BYPASS NORTON? • Fake SSL Certificate • Application Whitelisting Method • Delays and Continuous Process Consumption, but not too high. • Patience
  • 36. THANKS • For More Information on AV Evasion, refer to “Metasploit Bootcamp” & “Mastering Metasploit” • Twitter : @nipunjaswal • FB : @nipunjaswal • Linknd : @nipunjaswal • http://Amazon.com/authors/nipunjaswal