Windows Defender Bypass to Reverse Shell
Intro : Hello Hackers!!😀 what’s up. Today I will show you how to Bypass Windows Defender to catch a Reverse Shell in your Kali Host. Here we will use Nim Reverse Shell then compile it to Windows Executable File. So let’s start.
Nim Installation :
So here we will use this Github Repo for Nim Shell.
Now we have to install Nim to compile it. So need the Nim Installer first.
$ wget https://github.com/dom96/choosenim/releases/download/v0.8.4/choosenim-0.8.4_linux_amd64
Now we have execute the below Command to make the Nim Binary File.
$ ./nim update stable
So it will store in below Directory.
/home/simon/.nimble/bin
Here is the Command.
Making Payload :
Then execute the following command to create an exe file. Here I named it Update.exe.
$ ./nim c -d:mingw --app:gui --opt:speed -o:Update.exe ../../Desktop/rev.nim
Then set your Netcat Listener.
Next transfer the in your Windows Host. Note that Windows Defender must be Enabled.
Now run it and you will hopefully get a Reverse Shell in your Kali VM without any Defender interruption.
So that’s it for today. Hope you learn something new!!
Thanks to TylerRamsbey for his Excellent Video Explanation. Must watch!!
THANKS FOR READING!
If you enjoy this don’t forget to Like it and Follow me for more Articles.
Linkedin Profile → https://www.linkedin.com/in/subhankar-paul-332085254/
Happy Hacking~