Windows 10 antivirus catches the rev_https_8080.exe (including its zip file, .exe spoofing version of it and attaching media to the file) that we build in the Zaid lectures by placing it in the web site of kali and listening from kali on port 8080 to open a backdoor to windows 10. Am I doing something wrong or the antivirus got smarter. Lecture 17 spoofing .exe with media extension and other lectures relating to reverse spoofing. Thank you.
Windows 10 anti virus catches rev_https_8080.exe files including its zip file, its .exe extension spoofing(attaching it to a media file) version of it
The defender database is updated regularly. Maybe the RTLO vulnerability is being detected by the Windows now.
Hi, Thank you. Yes it seems that the very concept of reverse https is detected by windows defender and is deleted. For instance, if I put a .exe file containing reverse https back door and put it in website of Kali web server and try to access it form windows 10 as the lecture instructs it to do so, windows defender recognizes it as a virus and delete it before Kali can get a reverse https connection to windows 10 by listening at port 8080. Is it any way to trick windows defender in this matter?
I don’t know of any trick to overcome this issue. It is very hard nowadays to put .exe reverse backdoors. You can run the python files (backdoor scripts) but not the exe files.