Amnesiac - EDR Bypass
Introduction
Amnesiac
is a post-exploitation framework designed to assist with lateral movement within active directory environments.
Amnesiac is being developed to bridge a gap on Windows OS, where post-exploitation frameworks are not readily available unless explicitly installed. In fact, it is entirely written in PowerShell, and can be loaded and executed in memory, just like any other PowerShell script.
Load and Run
Attack Map
Attack Scenario
The attack scenario involves a post-exploitation phase:
The attacker already has access to the victim machine, which is a Windows system.
The attacker is using a Kali Linux machine as the primary attack machine.
Another Windows machine is utilized by the attacker to generate a payload listener using the tool Amnesiac.
The Amnesiac server runs on this Windows attack machine and generates a listener payload for the already compromised victim machine.
The attacker pastes the generated payload into the reverse shell session on the Kali Linux machine.
As a result, the attacker establishes a new session on the Windows attack machine through the reverse shell connection from the victim machine.
REFERENCES
Last updated
Was this helpful?