AMSI Bypass via .NET Reflection (PowerShell)


Disclaimer This content is provided for educational and research purposes only. It must not be used for malicious activities. The author assumes no responsibility for any misuse. This technique manipulates the internal .NET class AmsiUtils by setting the private static field amsiInitFailed to true. This tricks PowerShell into skipping AMSI initialization, effectively disabling AMSI scanning for the rest of the session. Full Version 1 2 3 4 # AMSI bypass using .…
Read more ⟶

DCSync: Privileges, Enumeration, Detection & Hardening


What DCSync Really Does DCSync abuses the MS-DRSR RPC protocol (Directory Replication Service Remote Protocol). Any principal with certain Extended Rights over the domain naming context can call IDL_DRSGetNCChanges and replicate AD data — including password hashes. The critical rights are: DS-Replication-Get-Changes → 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 DS-Replication-Get-Changes-All → 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 DS-Replication-Get-Changes-In-Filtered-Set → 89e95b76-444d-4c62-991a-0facbeda640c Where These Privileges Exist They are set on the domain root object (DC=RED,DC=CORP). By default, holders include: Domain Controllers (DC$ accounts) Administrators / Domain Admins / Enterprise Admins Directory sync service accounts (e.…
Read more ⟶