AppLocker

restrict which apps and files a user can run. Rules may be applied to the following file types:

  • Executable files: .exe, .com

  • Windows Installer files: .msi, .msp

  • Scripts: .js, .ps1, .vbs, .cmd, .bat

  • Packaged apps: .aappx

  • Dynamic-Link Libraries: .dll

Enumerating AppLocker

Exploiting the Default Ruleset

Enumerate folders inside %WINDIR% which standard users can both write to and execute from:

Copying NotMalware.exe to C:\Windows\Tasks, we notice that AppLocker does not prevent us from running the file

A brief look at the default ruleset for restricting scripts shows that the same bypass can be used.

LOLBAS: Regasm

LOLBAS / LOLDrivers / LOLESXi

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

  • Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.

Last updated