HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Herpaderping and Ghosting. Two new ways to hide processes from antiviruses

Written by be_a_saint

The primary objective of virus writers (as well as pentesters and Red Team members) is to hide their payloads from antiviruses and avoid their detection. Various techniques are used for this purpose. This paper discusses two of them: Herpaderping and Ghosting.
Read full article →

F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows

Written by be_a_saint

Is the phrase “This script contains malicious content and has been blocked by your antivirus software” familiar to you? It’s generated by Antimalware Scan Interface (AMSI), a protection mechanism embedded in Windows 10 that blocks the execution of malicious scripts. But can AMSI be bypassed? Sure, and today I will show how to do this.
Read full article →

Protected by Qrator Labs
Recent Posts
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
  • Infiltration and exfiltration. Data transmission techniques used in pentesting
  • Nightmare Spoofing. Evil Twin attack over dynamic routing
  • Herpaderping and Ghosting. Two new ways to hide processes from antiviruses
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
What do you think about HackMag.com domain name?
  • Add your answer
  • Add your answer
×
You or your IP had already vote.
Recent Posts
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
  • Infiltration and exfiltration. Data transmission techniques used in pentesting
  • Nightmare Spoofing. Evil Twin attack over dynamic routing
  • Herpaderping and Ghosting. Two new ways to hide processes from antiviruses
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2023

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.