Skip to content

Commit 9bf7ec0

Browse files
committed
Merge branch 'update_Break_The_Protective_Shell_Of_Windows_Defender_Wit_20250918_123628' of github.com:HackTricks-wiki/hacktricks into update_Break_The_Protective_Shell_Of_Windows_Defender_Wit_20250918_123628
2 parents 3f7af75 + 36e3dc1 commit 9bf7ec0

1 file changed

Lines changed: 2 additions & 12 deletions

File tree

src/windows-hardening/av-bypass.md

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -972,18 +972,8 @@ Post-exploitation options
972972
rmdir "C:\ProgramData\Microsoft\Windows Defender\Platform\5.18.25070.5-0"
973973
```
974974

975-
Detection ideas
976-
- Alert on new directory reparse points under `C:\ProgramData\Microsoft\Windows Defender\Platform\`.
977-
- Watch for new version-looking folder names exceeding known Defender versions.
978-
- Detect Defender binaries executing from non-standard paths (e.g., `C:\TMP\`).
979-
- Sysmon telemetry: FileCreate (Event ID 11) with ReparsePoint/Symlink in that path; process starts for `MsMpEng.exe` with unexpected image path.
980-
981-
Hardening tips
982-
- Enforce allow-listed execution paths with WDAC/AppLocker; prohibit Defender from running outside trusted directories.
983-
- Continuously validate Defender’s configured platform path; remediate anomalies.
984-
- Keep Tamper Protection enabled; monitor for Defender platform location changes.
985-
986-
> Note: This technique does not provide privilege escalation by itself; it requires admin rights.
975+
> [!TIP]
976+
> Note that This technique does not provide privilege escalation by itself; it requires admin rights.
987977
988978
## References
989979

0 commit comments

Comments
 (0)