AppLocker
restrict which apps and files a user can run. Rules may be applied to the following file types:
Executable files: .exe, .comWindows Installer files: .msi, .mspScripts: .js, .ps1, .vbs, .cmd, .batPackaged apps: .aappxDynamic-Link Libraries: .dll
In practice, Dynamic-Link libraries are not typically restricted, since Microsoft requires administrators to explicitly enable this rule collection due to reduced system performance issues.
Enumerating AppLocker
Exploiting the Default Ruleset
C:\Windows\Temp\ is a default AppLocker Exclusion Path
Enumerate folders inside %WINDIR% which standard users can both write to and execute from:
Copying NotMalware.exe to C:\Windows\Tasks, we notice that AppLocker does not prevent us from running the file
A brief look at the default ruleset for restricting scripts shows that the same bypass can be used.
LOLBAS: Regasm
LOLBAS / LOLDrivers / LOLESXiInteresting Books
Interesting BooksEvading EDR: The Definitive Guide to Defeating Endpoint Detection Systems The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
Last updated