FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

Defense Evasion: The Service Run Failed Successfully

By: ๏ผu๏ผCold-Dinosaur โ€” February 8th 2026 at 14:21

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".

submitted by /u/Cold-Dinosaur
[link] [comments]
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

EDR-Redir V2: Blind EDR With Fake "Program Files"

By: ๏ผu๏ผCold-Dinosaur โ€” November 1st 2025 at 10:52

EDR-Redir V2 can redirect entire folders like "Program Files" to point back to themselves, except for the folders of Antivirus, EDR. This means that other software continues to function normally, while only the EDR is redirected or blocked.

submitted by /u/Cold-Dinosaur
[link] [comments]
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

Using EDR-Redir To Break EDR Via Bind Link and Cloud Filter

By: ๏ผu๏ผCold-Dinosaur โ€” October 26th 2025 at 14:03

EDR-Redir uses a Bind Filter (mini filter bindflt.sys) and the Windows Cloud Filter API (cldflt.sys) to redirect the Endpoint Detection and Response (EDR) 's working folder to a folder of the attacker's choice. Alternatively, it can make the folder appear corrupt to prevent the EDR's process services from functioning.

submitted by /u/Cold-Dinosaur
[link] [comments]
โŒ