Evade Detection
π΅οΈ Evading Detection β Blending in With the Crowd
Good attackers hide. Great ones blend in. If your transfer techniques are getting flagged, itβs time to get stealthy.
Letβs explore how to evade detection by:
π οΈ Modifying user agents
π₯· Leveraging LOLBins and GTFOBins
π€ Using trusted binaries to download files
𦑠1. Changing User-Agent Strings
Many defenders watch for user-agents like curl/7.68.0
, PowerShell/5.1.14393
, or Microsoft BITS/7.8
.
Luckily, PowerShell's Invoke-WebRequest
supports custom User-Agent strings. π
π§ͺ List Built-In PowerShell User Agents
Youβll see options like:
Chrome
:Mozilla/5.0 ... Chrome/7.0.500.0
Firefox
:Gecko/20100401 Firefox/4.0
Safari
:AppleWebKit/533.16
π§ Use a Fake Chrome User-Agent
π‘ The server will log:
β
Much less suspicious than WindowsPowerShell/5.1
.
𧬠2. Living Off the Land β LOLBins & GTFOBins
When you're blocked from using PowerShell, Netcat, or external tools, turn to trusted system binaries β aka LOLBins πͺ€
These are binaries that:
β Are pre-installed
β Are signed by the vendor
β Are trusted by application whitelisting solutions
βοΈ Example: GfxDownloadWrapper.exe
A legitimate Intel binary that can download files from the web:
β May bypass application whitelisting β Could be excluded from AV logging or monitoring β Found only on machines with Intel drivers
π Pro Resources
Tip: Use
+file-download
and+file-upload
tags to discover binaries for your purpose.
Last updated