Description: Security Focus Europe: Injecting payload to memory using powershell (Antivirus Evasion)
Web. www.securityfocus.eu
E-Mail. securityfocus.eu@gmail.com
Tags: av evasion injecting payload into memory using powershell ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Demo looks cool but how did you create the powershell payload in the first place? That was probably the most important part of the demo.
Fell free to add to my msn sproductions()live.com
very ncie and easy done, thx :)
John-Nash,
If you look closer you will find out. I left many clues to figure out how to do it.
Great Work!
Hi Armitage1989,
Thanks. Can you please e-mail me I have a question for you.
@John-Nash: You're taking Nash's name in vain !
http://technet.microsoft.com/en-us/library/dd315276.aspx
-EncodedCommand
Accepts a base-64-encoded string version of a command. Use this parameter to submit commands to Windows PowerShell that require complex quotation marks or curly braces.
Hi friends,
Sorry to ask some basic question which i do not know as a beginner. How can i create a base64 string of a meterpreter that can be inserted to powershell as shown on the video?
Thank you so much for the help. : D