Skip to content

This project involves inspecting the vulnerabilities of the Windows OS by embedding hidden commands within images or audio files. The goal is to establish a TCP/UDP channel between Kali Linux and Windows. By default, Windows does not accept undefined TCP/UDP connections, which makes the project both intriguing and educational.

Notifications You must be signed in to change notification settings

ibeatricez/oss_project

Repository files navigation

oss_project

Advanced Security Evasion in Windows with Hidden Commands

Project Objective:

Evaluate how well different security solutions can detect and respond to stealthy attack techniques, including hidden command execution, keyloggers, process injection, backdoors, and persistence mechanisms. The objective is to evaluate the detection capabilities of Windows Defender and third-party antivirus/EDR solutions by logging system behavior, network activity, and event logs.

Project Expectations:

This project involves inspecting the vulnerabilities of the Windows OS by embedding hidden commands within images or audio files. The goal is to establish a TCP/UDP channel between Kali Linux(acting as the attacker) and Windows. By default, Windows does not accept undefined TCP/UDP connections, which makes the project both intriguing and educational.

Steps for Hidden Command within a file:

  • Generate and embed a hidden command within a file.
  • Download and execute the file on a Windows(VM)
  • Inspect Windows' defending system during the download and running potential threat.
  • Identify methods to make the threat detectable if it currently evades detection.

Objectives for Hidden Command within a file:

  • Create hidden commands within files.
  • Establish a communication channel between two operating systems.
  • Learn about defending systems, antiviruses, malware, and system tracking tools.

References:

  1. Non-Visual Command Execution & Process Hiding*

  2. Keylogger Deployment & Detection

  3. Backdoor Creation & Remote Access

  4. Process Injection & Memory Manipulation

  5. Persistence Techniques & Detection

  6. Windows Security Tests & Log Analysis

About

This project involves inspecting the vulnerabilities of the Windows OS by embedding hidden commands within images or audio files. The goal is to establish a TCP/UDP channel between Kali Linux and Windows. By default, Windows does not accept undefined TCP/UDP connections, which makes the project both intriguing and educational.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •