Bypass Kaspersky Endpoint Security for Windows with TrevorC2 + Pyfuscation
Let’s download Trevorc2 and Pyfuscation
Git clone https://github.com/trustedsec/trevorc2
Git clone https://github.com/CBHue/PyFuscation
After downloading Trevorc2 and Pyfuscation using the git clone, copy the file trevor_client.ps1, and throw it into the Pyfuscation folder
Change the IP address of SITE_URL to the IP of your Kali machine and save
Let’s obfuscate our powershell with pyfuscation
If all goes well it will generate this output, where the folder with obfuscated code is located
After that just access the folder and rename the file.ps1
We are going to open an HTTP server with python using http.server and now we are going to download ps1 on the victim’s machine
Realize that Kaspersky is operating and active
Now I will open Powershell in Admin
Now I’m going to access Firefox, type your Kali’s IP address on port 8000 to download the malicious powershell
Notice that it is in the downloads folder
Now let’s run the trevorc2 server: python3 trevorc2_server.py
let’s run the malicious powershell
This error means that our powershell has a policy of not executing any type of script
Let’s type the following command to release Set-ExecutionPolicy Unrestricted
Now let’s run the script, it says it is not a reliable script
See that the agent has now communicated with our C2, so Kaspersky did not detect the threat
View machine information
Note that we bypass Kaspersky Endpoint Security for Windows with ease
This is the result of Hybrid-Analysis and Virus Total, no detection.
Of course I uploaded it on purpose on the virus total.