Microsoft

Bruteforcing Windows Defender Exclusions



|| Join me for the SOC Analyst Appreciation Day! A completely FREE event on October 16th by DEVO!

[ad_2]

source

Related Articles

38 Comments

  1. Seems a bit pointless if all these are logged (as you said) to Event Viewer. Running a PowerShell command to pull that Event ID with some filtering is likely more stealthy (and accurate) than just generating a process over and over.

  2. Hey John, here is another way to do it..Use this in CMD. powershell -EP Bypass "$e=@(gci 'C:' -dir -r -ea 0|select -exp FullName);$b=@();foreach($p in $e){$b+=$p;if($b.Count -eq 200 -or $p -eq $e[-1]){$r=& 'C:Program FilesWindows DefenderMpCmdRun.exe' -Scan -ScanType 3 -File ($b -join '|') 2>&1;$b|?{$r-match [regex]::Escape($_)}|%{write-host ('Exclusion:'+$_)};$b=@()}}"

    Love what you do brother! It's alot faster, and you can make it review files & folders. Just adjust as needed. No elevation required.. 🎉

  3. Always great content, taking this further using a tool like binfinder from kudaes we can also find processes that are internally excluded by an edr

    Like SYSTEM level svchost processes and crowdstrike 😉

  4. It's an executable, it has to be calling some set of system calls to get this information (especially if PowerShell has embedded access). I imagine we can create something with a lot less overheard than rerunning the MpCmdRun each time.

  5. Pretty sure you could do what their code does with LoL using for in batch syntax and/or dir / S with some pipes and a find to only return output where things are skipped. I leave that as an exercise for the reader – but i think that would be better than relying on custom code that has be a file instead of executed in memory with all LoL code.

  6. This is why I am in favor of exluding on-access scans, while leaving on-demand/scheduled ones not excluded. X>.>X

    Pretty sure that you'd not get that feedback if it could properly be setup like that. (I've got bitdefender setup to exclude on-access, to several key folders to not slice my face off when I run IDEs for some projects, but leave on-demand intact because I don't code in that style that would trip the stuff.. I just hate the preformance hit.

  7. Please please please for the love of all that's holly, stop doing the shitty stupid thumbnail faces. You're a big stable channel, with strong content and a very good viewer base, you don't have to do what others do. You don't have to "play for the algorithm". Just please, stop that…
    A good informative thumbnail with a good informative title is very much ENOUGH!

  8. how many sigma rules do you need to write to cover off all conditions not detected by a typical edr 😕
    This is where I hope threat hunting query libraries can continue to improve in vendor products. eg. 'run all hunting queries' and get a human and/or robot to look at it.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button