Stealing RunAs Credentials While Bypassing EDR Detection
Автор: The Weekly Purple Team
Загружено: 2025-03-13
Просмотров: 1051
Welcome to another episode of The Weekly Purple Team! This week, we’re diving into Runas-Stealer, a tool that hooks into the Runas command to extract credentials and stealthily store them as an Alternate Data Stream (ADS) attached to desktop.ini.
In this episode, we’ll cover:
🔹 How Runas-Stealer operates and why it’s dangerous
🔹 How credentials are hidden using ADS
🔹 Detection techniques
💡 Whether you’re on the Red Team looking to understand offensive techniques or on the Blue Team strengthening defenses, this episode is packed with insights!
⚠️ Educational content only. Always use your knowledge responsibly.
🔔 Subscribe and turn on notifications for more Purple Team insights!
#TheWeeklyPurpleTeam #CyberSecurity #RedTeam #BlueTeam #MalwareAnalysis #ThreatHunting #purpleteam
RunAs-Stealer
https://github.com/DarkSpaceSecurity/...
Chapters
0:00 Intro
1:12 Defender Functionality
1:46 RunAs-Stealer Download and Execution
3:20 Stealing Credentials
5:32 Catching RunAs-Stealer
8:05 Outro
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: