Jump to content

AV issue avira


Net_Spy

Recommended Posts

Greetings,

 

I've created an payload using shellter with injection using putty binary. File is not detected by av but payload does not send connection back to metasploit machine , if I disable the avira AV  payload executed successfully. Can any one help me to deal with this while av is enabled and bypass as well to get successful connection. looking forward to your kind response.

 

Regards

Net_Spy

Link to comment
Share on other sites

I have not tried my luck against Avira yet.  I usually go against Avast for detection.  Question I have is does Avira have a firewall?  Try to ping the attacker machine from the victim with Avira on and see if it talks to it.  Put up a simple web page on attacker and see if you can browse to it with Avira on.  If so, it maybe still seeing the payload in transit and stopping.

Last question, are you running a staged payload or stageless.  You know it is staged in Metasploit if it says something upon connection about sending stage 1, etc.  Maybe stage is getting intercepted.  So many things could be the issue and you may have to do some things by hand to see what is happening.  Like I try hand grabbing payloads as plain text, compressed and even encrypted across the wire to see what gets through and see if it gets detected as I decrypt and\or uncompress and run.  Since I do not use Avira, I cannot tell you where it might be dying.  Maybe the Avira logs will tell you something?  probably even running sysinternal process monitor to watch and see what fires off and stuff when the payload is launched.  Compare to to how it looks when it launches without AV versus how it looks when launched with it.

Last thing, I always test in a VM, not only for protection of machine but for rollbacks mainly to clear the AV.  Avast remembers bad payloads or payloads that were good but now deemed bad because they launched something that was considered bad.  Once a payload is seen by avast, locally it will remember so even when I obfuscate it, it is still detected sometimes.  Snapshot rollback to before the payload was detected fixes that.

Link to comment
Share on other sites

@PoSHMagiC0de  Thanks . I've tried both stage and stageless as well and yes avira does have a firewall ,  I've tried on an other machine on same network but with avira installed and it does established a connection with meterpreter session. Can you help me to sort it out and bypass it. I could not figure it out . Looking forward to your kind response.

 

Regards

Net_Spy

Link to comment
Share on other sites

Will be hard as it is trial and error.  You can try using the web_delivery agent and its Powershell stager to launch it.  Try veil with Powershell and even Veil's cs meterpreter with ARYA.  Might decrease detectability if you just grab the source it produces in csharp and compile it on a Windows machine using csc.exe.  You might want to look up Obfuscation and try all the tricks they recommend.

 

Also, try tunring off Avira's firewall only and see if your session connects.

Edited by PoSHMagiC0de
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...