6 min read
Enumeration A Comprehensive Guide for Modern Pentesters
A Comprehensive Guide for Modern Pentesters
At times, it will be handy to have all complementary evasion commands at hand. We tried to compile the ultimate list, without going overboard.
C2 Powershell Empire is a classic - but can you still use it with EDR (Defender) in place?
We made the bold claim, that all AMSI evasions still work. But is that really true? Come in for a ride.
Let's try and do things like they're done in real attacks. While the media recently was all over ConnectWise ScreenConnect, we instead focus on AnyDesk - which is used by many Cybercriminals these days - in an Assumed Breach scenario.
We created a custom reverse shell from scratch and made it persistent - the result is scary, to say the least.