❌

Reading view

WEBCAST: Sacred Cash Cow Tipping 2018

John Strand// It’s time for our annual anti virus bypass extravaganza. See why AV can’t be the end all be all solution to your security framework in 2018! And if […]

The post WEBCAST: Sacred Cash Cow Tipping 2018 appeared first on Black Hills Information Security, Inc..

  •  

Bypassing Cylance: Part 4 – Metasploit Meterpreter & PowerShell Empire Agent

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment. Β The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 4 – Metasploit Meterpreter & PowerShell Empire Agent appeared first on Black Hills Information Security, Inc..

  •  

Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel

David Fletcher // The following techniques serve to illustrate methods for obtaining C2 communication in a particular Cylance protected environment. Β The configuration of the centralized infrastructure and the endpoint agents […]

The post Bypassing Cylance: Part 3 – Netcat & Nishang ICMP C2 Channel appeared first on Black Hills Information Security, Inc..

  •  

Bypassing Cylance: Part 1 – Using VSAgent.exe

David Fletcher // Recently, we had the opportunity to test a production Cylance environment. Obviously, each environment is going to be different and the efficacy of security controls relies largely […]

The post Bypassing Cylance: Part 1 – Using VSAgent.exe appeared first on Black Hills Information Security, Inc..

  •  

How to Bypass Anti-Virus to Run Mimikatz

Carrie Roberts // * Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script β€œInvoke-Mimikatz” from PowerSploitΒ on my machine but it was […]

The post How to Bypass Anti-Virus to Run Mimikatz appeared first on Black Hills Information Security, Inc..

  •  

How to Bypass Application Whitelisting & AV

Brian Fehrman // There are numerous methods that have been published to bypass Anti-Virus products. As a result, many companies are beginning to realize that application whitelisting is another tool […]

The post How to Bypass Application Whitelisting & AV appeared first on Black Hills Information Security, Inc..

  •  
❌