← Back to API Browser
System.Net.ServicePointManager.ServerCertificateValidationCallback
⚠️ High Risk📁 Windows Dotnet Api🏷️ evasion✅ Verified
#windows_dotnet_api#evasion#lotl
🔧 API Details
Namespace
System.Net
Language
.NET 2.0+
Class
ServicePointManager
📊 Risk Assessment
Severity
High
Prevalence
emerging
Ease of Abuse
easy
Likelihood in Real Attacks
75%
🎯 MITRE ATT&CK Techniques
⚡ Abuse Scenarios
SSL certificate bypass
Technique: T1557.002
Disable SSL/TLS certificate validation for MITM
Code Example:
ServicePointManager.ServerCertificateValidationCallback = (s, c, ch, ssl) => true;Detection Difficulty: Medium
🔍 Detection Strategies
Microsoft Defender
MEDIUM EffectivenessBehavioral detection based on process tree and API patterns
Splunk
MEDIUM EffectivenessCorrelate process events with network activity
🛡️ Mitigation Strategies
policy
MEDIUM FeasibilityBlock execution of System.Net.ServicePointManager.ServerCertificateValidationCallback via AppLocker or similar controls
monitoring
EASY FeasibilityAlert on unusual usage of System.Net.ServicePointManager.ServerCertificateValidationCallback
🕵️ Threat Intelligence
🔨 Tools
Cobalt Strike
Empire
Mimikatz
📋 Metadata
API ID
27b9fb61-b08d-46d1-8d27-a10f09a9dc52
Created
2026-01-31
Author
Claw