Learn Post-Exploitation, Evasion, and AI Attacks (GCIH) with Interactive Flashcards

Master key concepts in Post-Exploitation, Evasion, and AI Attacks through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Endpoint Security Bypass Techniques

Endpoint Security Bypass Techniques are critical concepts in the GCIH domain, particularly within post-exploitation and evasion tactics. These techniques allow attackers to circumvent endpoint detection and response (EDR) tools, antivirus (AV) software, and other host-based security mechanisms after gaining initial access to a system.

**Key Bypass Techniques Include:**

1. **Living Off the Land Binaries (LOLBins):** Attackers leverage legitimate system tools like PowerShell, WMI, certutil, mshta, and rundll32 to execute malicious actions. Since these are trusted binaries, they often evade signature-based detection.

2. **Process Injection:** Techniques such as DLL injection, process hollowing, and reflective DLL loading allow malicious code to execute within the memory space of legitimate processes, evading process-based monitoring.

3. **AMSI Bypass:** The Antimalware Scan Interface (AMSI) in Windows inspects scripts at runtime. Attackers patch AMSI in memory or obfuscate payloads to prevent detection of malicious PowerShell or .NET code.

4. **ETW Patching:** Event Tracing for Windows (ETW) feeds telemetry to EDR solutions. By patching ETW functions in memory, attackers can blind security tools from seeing malicious activity.

5. **Obfuscation and Encryption:** Payload encoding, polymorphic code, and custom encryption prevent signature-based detection. Tools like Cobalt Strike, Sliver, and custom loaders use these methods extensively.

6. **Unhooking Techniques:** EDR tools hook Windows API calls to monitor behavior. Attackers can unhook these by reloading clean copies of DLLs (e.g., ntdll.dll) from disk, effectively removing the EDR's visibility.

7. **Timestomping and Log Tampering:** Modifying file timestamps and clearing event logs hinders forensic analysis and detection.

8. **AI-Powered Evasion:** Emerging techniques use machine learning to generate adversarial samples that fool AI-based detection models, dynamically adapting payloads to bypass behavioral analysis.

**Defense Considerations:** Organizations should implement defense-in-depth strategies including behavioral analytics, memory scanning, kernel-level monitoring, and zero-trust architectures to counter these sophisticated bypass techniques. Understanding these methods is essential for incident handlers to detect, respond to, and mitigate advanced threats effectively.

Application Allow List Evasion

Application Allow List Evasion is a critical post-exploitation technique tested in the GCIH certification that involves bypassing security controls designed to restrict which applications can execute on a system. Application allow listing (formerly known as whitelisting) is a security measure where only pre-approved applications are permitted to run, blocking all unauthorized executables. However, attackers have developed sophisticated methods to circumvent these controls.

Key evasion techniques include:

1. **Living Off the Land Binaries (LOLBins):** Attackers leverage legitimate, pre-installed system tools that are already on the allow list. Tools like PowerShell, MSHTA, WMIC, CertUtil, Rundll32, and Regsvr32 are trusted by the operating system and can be abused to execute malicious code, download payloads, or perform lateral movement without triggering allow list restrictions.

2. **DLL Hijacking and Side-Loading:** Instead of executing blocked binaries, attackers place malicious DLLs in locations where trusted applications will load them, effectively executing arbitrary code through an approved application.

3. **Script-Based Attacks:** Using scripting engines already approved on the system, such as PowerShell, VBScript, JScript, or Python, attackers can execute malicious scripts that bypass application-level restrictions.

4. **Trusted Application Abuse:** Attackers exploit features of trusted applications like Microsoft Office macros, MSBuild, InstallUtil, or other .NET framework utilities to compile and execute malicious code.

5. **Fileless Malware:** By executing payloads entirely in memory without writing to disk, attackers avoid triggering file-based allow list checks.

6. **Code Signing Exploitation:** Attackers may steal or forge code-signing certificates to make malicious applications appear trusted.

Defensive measures include implementing robust allow list policies that restrict not just executables but also scripts and DLLs, monitoring LOLBin usage with behavioral analytics, applying least-privilege principles, enabling PowerShell Constrained Language Mode, using advanced EDR solutions, and maintaining comprehensive logging. Understanding these evasion techniques is essential for incident handlers to detect, respond to, and mitigate sophisticated attacks that bypass traditional application controls.

Establishing Persistence

Establishing persistence is a critical post-exploitation technique where an attacker ensures continued access to a compromised system, even after reboots, password changes, or security patches. Once an attacker gains initial access, persistence mechanisms guarantee they can return without re-exploiting the original vulnerability.

**Common Persistence Techniques:**

1. **Registry Run Keys & Startup Folders**: Attackers modify Windows registry keys (e.g., HKLM\Software\Microsoft\Windows\CurrentVersion\Run) or place malicious executables in startup folders to execute payloads at boot time.

2. **Scheduled Tasks/Cron Jobs**: Creating scheduled tasks (Windows) or cron jobs (Linux) that periodically execute malicious code, ensuring the backdoor remains active.

3. **Service Creation**: Installing malicious services that start automatically with the operating system, often disguised as legitimate system services.

4. **DLL Hijacking/Side-Loading**: Placing malicious DLLs in directories where legitimate applications search for libraries, causing automatic execution when the application runs.

5. **Web Shells**: Deploying server-side scripts on web servers that provide remote command execution capabilities through HTTP requests.

6. **Account Manipulation**: Creating new user accounts, adding SSH keys, or modifying existing credentials to maintain access through legitimate authentication channels.

7. **Bootkit/Rootkit Installation**: Modifying boot records or kernel-level components to maintain deeply embedded, stealthy access that survives OS reinstallation.

8. **WMI Event Subscriptions**: Using Windows Management Instrumentation to trigger malicious actions based on system events.

**Evasion Considerations**: Attackers often employ multiple persistence mechanisms simultaneously for redundancy. They disguise their artifacts using legitimate-sounding names, timestomping, and living-off-the-land binaries (LOLBins) to evade detection.

**Detection & Response**: Incident handlers should monitor autorun locations, audit scheduled tasks, review service installations, analyze unusual account activity, and use tools like Autoruns, OSQuery, or EDR solutions to identify unauthorized persistence mechanisms. Understanding these techniques is essential for GCIH practitioners to effectively detect, contain, and remediate compromised systems.

Hijacking Attacks (DLL, Token, Session)

Hijacking attacks are critical post-exploitation techniques where an attacker intercepts or manipulates legitimate system resources to gain unauthorized access, escalate privileges, or maintain persistence. In the GCIH context, three primary hijacking types are essential:

**DLL Hijacking** exploits how Windows applications search for Dynamic Link Libraries (DLLs). When an application doesn't specify a full path, Windows follows a predefined search order (application directory, system directories, PATH directories). Attackers place a malicious DLL with the same name as a legitimate one in a higher-priority search location. When the application loads, it executes the malicious DLL instead, granting the attacker code execution within the context of the vulnerable application. This technique is effective for privilege escalation and evading security controls since the malicious code runs under a trusted process.

**Token Hijacking** involves stealing or impersonating Windows access tokens, which represent a user's security context. After compromising a system, attackers can use tools like Mimikatz or Incognito to enumerate and impersonate tokens of higher-privileged users (e.g., domain administrators). Token impersonation allows attackers to perform actions as another user without knowing their credentials. Delegation tokens (from interactive logons) and impersonation tokens (from non-interactive sessions) are both valuable targets.

**Session Hijacking** involves taking over an active authenticated session between a user and a service. This includes TCP session hijacking (predicting sequence numbers), web session hijacking (stealing session cookies via XSS, sniffing, or session fixation), and RDP session hijacking (using tools like tscon to connect to disconnected sessions without credentials). Attackers bypass authentication entirely by leveraging already-established trust.

**Evasion and AI Considerations:** Attackers increasingly use AI to identify vulnerable DLL paths, automate token harvesting, and predict session identifiers. Defenders must implement DLL safe search, monitor token usage anomalies, enforce session timeouts, use encrypted communications, and deploy behavioral analytics to detect these sophisticated hijacking techniques in modern threat landscapes.

Pivoting and Lateral Movement

Pivoting and Lateral Movement are critical post-exploitation techniques that attackers use to expand their foothold within a compromised network, and understanding them is essential for GCIH-certified professionals.

**Pivoting** refers to the technique where an attacker uses an already compromised system as a launching point to access other networks or segments that are not directly reachable from the attacker's original position. For example, if an attacker compromises a dual-homed host connected to both a DMZ and an internal network, they can pivot through that host to reach internal systems. Common pivoting tools include Metasploit's autoroute module, SSH tunneling, SOCKS proxies, and tools like Chisel or Ligolo. Pivoting effectively turns a compromised machine into a relay, allowing the attacker to bypass network segmentation and firewall rules.

**Lateral Movement** is the process of moving from one compromised system to other systems within the same network. Attackers use techniques such as Pass-the-Hash (PtH), Pass-the-Ticket (PtT), credential dumping with tools like Mimikatz, exploitation of Windows protocols (SMB, WMI, RDP, PsExec), and abuse of Active Directory trust relationships. The goal is to escalate privileges, locate sensitive data, and gain access to high-value targets like domain controllers.

**Evasion Considerations:** Attackers employ various evasion techniques during lateral movement, including using legitimate administrative tools (living-off-the-land binaries like PowerShell, WMIC), encrypting communications, timestomping, and clearing event logs to avoid detection.

**AI-Enhanced Attacks:** Modern threat actors increasingly leverage AI to automate reconnaissance, identify optimal pivot points, and select lateral movement paths that minimize detection probability.

**Detection and Defense:** Incident handlers should monitor for anomalous authentication patterns, unusual SMB/RDP connections, unexpected network traffic between segments, and credential abuse indicators. Network segmentation, zero-trust architecture, endpoint detection and response (EDR), and robust logging are essential countermeasures against these techniques.

Command and Control (C2) Frameworks

Command and Control (C2) Frameworks are sophisticated tools used by both attackers and penetration testers to maintain persistent communication with compromised systems, enabling remote management, data exfiltration, and lateral movement within a target network. In the context of GCIH and post-exploitation, understanding C2 frameworks is critical for both offensive operations and incident response.

Popular C2 frameworks include Cobalt Strike, Metasploit, Empire, Sliver, and Covenant. These tools provide operators with centralized management consoles to control multiple implants (agents/beacons) deployed across compromised hosts. They support features like encrypted communications, modular payload delivery, privilege escalation, credential harvesting, and pivoting through networks.

C2 frameworks employ various evasion techniques to avoid detection. These include domain fronting, DNS tunneling, HTTPS encryption, malleable C2 profiles that mimic legitimate traffic, sleep/jitter intervals to reduce beacon frequency, and process injection to hide within legitimate processes. Modern frameworks also leverage legitimate cloud services (such as Azure, AWS, or Slack) as communication channels to blend with normal traffic.

From an AI-attack perspective, emerging threats involve AI-enhanced C2 systems that can dynamically adapt communication patterns, automatically evade endpoint detection and response (EDR) solutions, and use machine learning to optimize attack paths. AI can also generate polymorphic payloads and automate decision-making during post-exploitation phases, making attacks faster and harder to detect.

For incident handlers, detecting C2 activity involves monitoring for unusual network beaconing patterns, anomalous DNS queries, encrypted traffic to suspicious destinations, and behavioral indicators on endpoints. Tools like network traffic analyzers, SIEM systems, and threat intelligence feeds are essential for identifying C2 infrastructure.

Understanding C2 frameworks is fundamental for GCIH professionals, as it enables them to recognize attacker methodologies, conduct effective threat hunting, perform forensic analysis of compromised environments, and develop appropriate containment and remediation strategies to neutralize persistent threats within an organization's network.

Data Exfiltration Techniques

Data exfiltration techniques refer to the methods attackers use to unauthorized transfer of data from a compromised system to an external location under their control. In the context of GCIH and post-exploitation, understanding these techniques is critical for incident handlers to detect, prevent, and respond to data theft.

**Common Data Exfiltration Techniques:**

1. **DNS Tunneling:** Attackers encode stolen data within DNS queries and responses, leveraging the fact that DNS traffic is often allowed through firewalls without deep inspection. Tools like DNScat2 and Iodine facilitate this.

2. **HTTP/HTTPS Exfiltration:** Data is transmitted over standard web protocols, blending with legitimate traffic. Attackers may use POST requests, steganography in images, or encrypted HTTPS channels to evade detection.

3. **Cloud Storage Services:** Leveraging legitimate services like Dropbox, Google Drive, or OneDrive to upload stolen data, making it difficult to distinguish from normal business operations.

4. **Email-Based Exfiltration:** Sending data as attachments or embedded content through corporate email or webmail services.

5. **Encrypted Channels:** Using custom encryption or protocols like SSH, VPN tunnels, or Tor to obscure exfiltrated data from network monitoring tools.

6. **Steganography:** Hiding data within ordinary files such as images, audio, or video files to bypass content inspection systems.

7. **Physical Methods:** Using USB drives, removable media, or even printed documents to physically remove data.

8. **Protocol Abuse:** Leveraging ICMP, NTP, or other uncommon protocols to covertly transmit data.

**AI-Enhanced Evasion:** Modern attackers employ AI to adaptively select exfiltration channels, mimic normal traffic patterns, and evade anomaly-based detection systems. Machine learning models can optimize data transfer timing and volume to avoid triggering alerts.

**Detection and Prevention:** Incident handlers should implement DLP solutions, monitor for unusual traffic patterns, perform deep packet inspection, analyze DNS query anomalies, and establish baseline network behavior to identify deviations indicative of exfiltration activities.

Defense Evasion and Anti-Forensics

Defense Evasion and Anti-Forensics are critical concepts in the GCIH domain, focusing on techniques attackers use to avoid detection and hinder investigation efforts during and after a compromise.

**Defense Evasion** encompasses methods attackers employ to bypass security controls, evade monitoring systems, and remain undetected within a target environment. Common techniques include: disabling or tampering with security tools (antivirus, EDR, SIEM agents), obfuscating malicious code through encryption or encoding, leveraging living-off-the-land binaries (LOLBins) such as PowerShell, WMI, or certutil to blend with legitimate activity, process injection into trusted processes, DLL side-loading, timestomping to alter file metadata, and using fileless malware that operates entirely in memory. Attackers may also manipulate access tokens, exploit trusted relationships, or use rootkits to hide their presence at the OS or firmware level. Techniques like clearing or modifying event logs, using encrypted communication channels (C2 over HTTPS/DNS), and masquerading as legitimate services further complicate detection.

**Anti-Forensics** specifically targets the investigative process, aiming to destroy, alter, or obscure digital evidence. Key techniques include: secure deletion of files using tools like SDelete or shred, log wiping or selective log tampering, encrypting stolen data or communications, steganography to hide data within innocuous files, manipulating filesystem timestamps (timestomping), using encrypted volumes or hidden partitions, and trail obfuscation through VPNs, Tor, or compromised intermediary systems. Attackers may also employ data hiding in slack space, alternate data streams (ADS) in NTFS, or corrupt forensic artifacts deliberately.

For incident handlers, understanding these techniques is essential for effective detection and response. Countermeasures include centralized and immutable logging, endpoint detection and response (EDR) solutions, memory forensics, behavioral analytics, integrity monitoring, and maintaining proper chain of custody. Proactive threat hunting and AI-powered anomaly detection are increasingly vital to identify sophisticated evasion attempts that traditional signature-based tools may miss.

AI System Attacks and Prompt Injection

AI System Attacks and Prompt Injection represent a critical and emerging threat category in the cybersecurity landscape, particularly relevant to GCIH practitioners dealing with post-exploitation and evasion techniques.

**AI System Attacks** encompass a broad range of techniques targeting machine learning models and AI-powered systems. These include adversarial attacks (manipulating inputs to fool ML models), data poisoning (corrupting training data to compromise model integrity), model extraction (stealing proprietary AI models through repeated queries), and model inversion (extracting sensitive training data from a deployed model). Attackers exploit these vulnerabilities to bypass AI-driven security controls, evade detection systems, or compromise AI-dependent infrastructure.

**Prompt Injection** is a specific attack vector targeting Large Language Models (LLMs) and AI systems that process natural language inputs. It occurs when an attacker crafts malicious input that overrides or manipulates the system's original instructions. There are two primary types:

1. **Direct Prompt Injection**: The attacker directly inputs malicious prompts to manipulate the AI's behavior, bypassing safety guardrails, extracting system prompts, or causing the model to perform unintended actions such as data exfiltration or generating harmful content.

2. **Indirect Prompt Injection**: Malicious instructions are embedded in external data sources (websites, documents, emails) that the AI system processes, causing it to execute unintended commands without the user's knowledge.

From an incident handler's perspective, these attacks pose significant challenges because they can be used for evasion (bypassing AI-powered security tools like EDR, SIEM, or email filters), privilege escalation (manipulating AI agents with system access), and data exfiltration (tricking AI assistants into revealing sensitive information).

Mitigation strategies include input validation and sanitization, implementing robust guardrails, output filtering, least-privilege principles for AI agents, continuous monitoring of AI system behaviors, and red-teaming AI deployments. Incident handlers must understand these attack vectors to effectively detect, respond to, and remediate AI-targeted incidents in modern environments.

LLM Security Risks and Defenses

LLM (Large Language Model) Security Risks and Defenses represent a critical emerging domain within the GCIH framework, particularly relevant to post-exploitation, evasion, and AI-driven attacks.

**Key LLM Security Risks:**

1. **Prompt Injection**: Attackers craft malicious inputs to manipulate LLM behavior, bypassing safety guardrails. This includes direct injection (user-supplied malicious prompts) and indirect injection (embedding malicious instructions in external data sources the LLM processes).

2. **Data Poisoning**: Adversaries corrupt training data to introduce backdoors or biases, causing the model to produce harmful outputs under specific conditions.

3. **Model Exfiltration & Theft**: Attackers extract proprietary model weights or training data through repeated API queries, enabling model replication or exposing sensitive information.

4. **Sensitive Data Disclosure**: LLMs may inadvertently leak confidential training data, PII, or internal system prompts when manipulated through carefully crafted queries.

5. **Supply Chain Attacks**: Compromised plugins, extensions, or third-party integrations connected to LLMs can serve as attack vectors for lateral movement and privilege escalation.

6. **Excessive Agency**: LLMs granted excessive permissions or autonomous capabilities can be weaponized to execute unauthorized actions across connected systems.

7. **AI-Powered Social Engineering**: Attackers leverage LLMs to generate convincing phishing emails, deepfake content, and automated spear-phishing campaigns at scale.

**Defenses:**

1. **Input Validation & Sanitization**: Implement strict filtering of user inputs and contextual boundaries to prevent prompt injection.

2. **Output Filtering**: Monitor and restrict LLM outputs to prevent data leakage and harmful content generation.

3. **Least Privilege Access**: Limit LLM permissions and API access to minimize blast radius during compromise.

4. **Red Teaming & Adversarial Testing**: Regularly test LLMs against known attack techniques using frameworks like OWASP Top 10 for LLMs.

5. **Monitoring & Logging**: Implement comprehensive logging of LLM interactions for anomaly detection and incident response.

6. **Human-in-the-Loop**: Require human approval for critical actions initiated by LLMs.

7. **Retrieval-Augmented Generation (RAG) Security**: Secure external data sources to prevent indirect prompt injection through knowledge bases.

Detecting Post-Exploitation Activity

Detecting post-exploitation activity is a critical skill for incident handlers, as attackers who have already gained initial access will attempt to maintain persistence, escalate privileges, move laterally, and exfiltrate data while evading detection.

**Key Detection Methods:**

1. **Network Traffic Analysis:** Monitor for unusual internal lateral movement, such as unexpected SMB, RDP, WinRM, or SSH connections between systems. Beacons from command-and-control (C2) frameworks like Cobalt Strike or Metasploit often exhibit regular callback intervals, jitter patterns, and encoded/encrypted traffic on uncommon ports.

2. **Endpoint Detection:** Monitor process creation logs (Sysmon Event ID 1), particularly for suspicious parent-child process relationships (e.g., Word spawning PowerShell). Look for LSASS memory access attempts (credential dumping via Mimikatz), unusual DLL loading, and process injection techniques like process hollowing or reflective DLL injection.

3. **Log Analysis:** Centralize and correlate Windows Event Logs, especially Event IDs 4624/4625 (logon events), 4672 (special privileges), 4688 (process creation), and 7045 (service installation). Watch for evidence of privilege escalation, new scheduled tasks, or registry persistence mechanisms.

4. **Behavioral Analytics:** Employ UEBA (User and Entity Behavior Analytics) to detect anomalous account activity, such as service accounts performing interactive logons, unusual access times, or accounts accessing resources they historically never touched.

5. **AI-Powered Evasion Awareness:** Modern attackers leverage AI to generate polymorphic malware, craft convincing phishing, and adapt C2 traffic to mimic legitimate protocols. Defenders must employ ML-based detection tools that identify behavioral anomalies rather than relying solely on signature-based approaches.

6. **Memory Forensics:** Tools like Volatility can detect fileless malware, injected code, and hidden processes that disk-based analysis would miss.

**Best Practices:** Implement defense-in-depth with EDR solutions, network segmentation, SIEM correlation rules, threat hunting programs, and deception technologies (honeypots/honeytokens) to detect post-exploitation activity early and minimize dwell time.

Responder and Network Insider Attacks

Responder is a powerful post-exploitation and network insider attack tool used extensively in penetration testing and real-world attacks. It is a LLMNR (Link-Local Multicast Name Resolution), NBT-NS (NetBIOS Name Service), and MDNS poisoner designed to exploit weaknesses in Windows name resolution protocols.

When a Windows machine fails to resolve a hostname via DNS, it falls back to LLMNR and NBT-NS protocols, broadcasting the query to the local network. Responder listens for these broadcast queries and responds to them, pretending to be the requested host. This is a classic Man-in-the-Middle (MitM) attack vector.

Key capabilities of Responder include:

1. **Credential Harvesting**: By poisoning name resolution requests, Responder captures NTLMv1/v2 hashes when victims attempt to authenticate to the attacker's rogue services. These hashes can be cracked offline or relayed in NTLM relay attacks.

2. **Rogue Service Hosting**: Responder can spin up fake SMB, HTTP, FTP, LDAP, SQL, and other servers to capture credentials from unsuspecting clients.

3. **WPAD Exploitation**: It can poison Web Proxy Auto-Discovery (WPAD) requests, redirecting victims' web traffic through the attacker's proxy for credential interception.

4. **NTLM Relay Attacks**: Captured authentication attempts can be relayed to other services, enabling lateral movement without cracking passwords.

From an evasion perspective, Responder operates passively on the network, waiting for broadcast queries rather than actively scanning, making it harder to detect. Defenders should implement countermeasures such as disabling LLMNR and NBT-NS via Group Policy, enabling SMB signing, segmenting networks, and monitoring for abnormal name resolution traffic.

In the context of AI-enhanced attacks, adversaries can combine Responder with AI-driven decision-making to automatically identify high-value targets, optimize poisoning timing, and adapt evasion techniques based on network defense patterns. GCIH professionals must understand these attack vectors to effectively detect, respond to, and mitigate network insider threats.

More Post-Exploitation, Evasion, and AI Attacks questions
720 questions (total)