Student Reviews
( 5 Of 5 )
1 review
Video of Metasploit Framework Tutorial Series Antivirus Bypass Demo Scenario P2 in Metasploit Framework course by Motasem Hamdan Cyber Security & Tech channel, video No. 21 free certified online
Note: The current method of testing the bypass of AVs, specifically Windows Defender, using Metasploit with Msfvenom payloads may not be sufficient for newer versions of Windows Defender. Definitely one needs to use custom templates and packers along with the payload to test the strength of the AV.
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
Cybersecurity articles & CTF Writeups
https://motasem-notes.net/category/articles/
https://motasem-notes.net/category/ctf-writeups-walkthrough/
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:01 - Introduction to Metasploit Antivirus Evasion
0:07 - Objective: Creating an Undetectable Payload
0:22 - Purpose of Evasion: Testing Client Security
0:55 - Using Metasploit's msfvenom to Create Payloads
1:16 - Defining Windows Reverse TCP Payload and Port
1:54 - Obfuscation Techniques and Iterations for AV Evasion
2:25 - Creating and Saving the Payload Executable
3:03 - Setting Up Multi/Handler Listener in Metasploit
3:49 - Configuring Advanced Settings for Staged Payloads
4:52 - Explanation of Stage Encoding for Evasion
5:38 - Running Exploit and Testing the Payload on Target
6:17 - Moving Payload to Target Environment
7:00 - Verifying Active Sessions and Shell Access
7:29 - Increasing Evasion by Binding Shellcode to Executable
7:54 - Choosing Executable for Binding the Payload
8:37 - Troubleshooting Binding Process and Errors
10:00 - Adjusting Payload for Compatibility with Target
13:04 - Final Steps for Binding to 32-bit or 64-bit Executable
15:14 - Configuring Multi/Handler for Correct Architecture
16:01 - Testing Obfuscated Executable on Target
16:57 - Debugging Session Failure Due to Architecture Mismatch
18:01 - Conclusion: Best Practices for Metasploit Evasion