Break The Protective Shell Of Windows Defender With The Fold... #1417
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post shows: A deterministic way to hijack Windows Defender’s execution folder by abusing its versioned update/selection logic and a directory symbolic link placed under ProgramData\Microsoft\Windows Defender\Platform. This lets an admin make WinDefend run from an attacker-writable path, enabling DLL sideloading or outright disabling Defender by breaking the link.
How Defender chooses its binaries (observed with
Code execution via DLL sideloading from the hijacked directory: Once Defender executes from the attacker-controlled folder, drop/replace DLLs expected to be loaded from the application directory to achieve code execution inside Defender’s processes (classic sideloading pattern leveraging LoadLibrary search order).
Persistent Defender disablement by breaking the redirected path: After redirection, remove ...
🤖 Agent Actions
I analyzed the repository and found the most relevant location for this Windows Defender tampering technique is the consolidated Windows AV/EDR evasion page:
That page already covers Defender-related tampering concepts (including a PPL-based tamper approach) and DLL sideloading, so it’s the right place to add a new section about the Platform version-folder symlink hijack.
What I added:
Changes implemented:
No new file was required because the content integrates naturally with the current AV bypass page and leverages existing sections (e.g., DLL sideloading) for cross-referencing.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup