Bypassing endpoint protections with AMSI, BYOVD, and rootkit

This title was summarized by AI from the post below.

It is insane how layering a first stage AMSI bypass, D/Invoking amsihook.c as a new thread (permanent AMSI bypasses), then loading additional binaries with a old school BYOVD exploit and hiding it with a userland rootkit (just r77), and persisting it with common registry keys was all that was needed to bypass most endpoint protections. Outside of the three final stage binaries, no other implant was dropped to disk except the MSI file to start up the attack chain. But even then, using mass exploitation techniques to replace the MSI spearphishing payload sufficed.

To view or add a comment, sign in

Explore content categories