Physical Attack: Remove EDR
Remove EDR and XDR via Physical Attack
MITRE ATT&CK
T1562.001 - Impair Defenses: Disable or Modify Tools
T1070.003 - Indicator Removal on Host: File Deletion
Okay, let’s assume you are on an Assume Breach engagement. The client provides you with an employee’s laptop or computer that is already standardized with endpoint security, such as EDR or XDR. You can try this approach to completely disable the EDR from the device:
Unplug the internal SSD or hard disk from the employee's laptop.
Boot into your Linux OS and treat the employee’s SSD as an external drive.
Then, run this command:
Check Encryption Type
BitLocker Encryption Decrypt
Remove EDR
Dump SAM
Remove Local Admin password:
Put the drive back into the employee’s laptop.
Boot into Windows and log in as an Administrator.
Promote your user account to Local Administrator.
If NDR (Network Detection and Response) is not implemented, you can use the device to attack the internal network. This is because the device remains connected to the internal network, but with EDR and XDR removed.
Last updated