-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add evasion module applocker_evasion_install_util #11795
Add evasion module applocker_evasion_install_util #11795
Conversation
@busterb should I submit each Applocker evasion technique as separate evasion modules or should I create one module that gives the option of which Applocker evasion to create? |
@@ -0,0 +1,9 @@ | |||
## Intro | |||
|
|||
This module is designed to evade solutions such as software restriction policies and Applocker. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
software restriction policies
this is too vague
documentation/modules/evasion/windows/applocker_evasion_install_util.md
Outdated
Show resolved
Hide resolved
documentation/modules/evasion/windows/applocker_evasion_install_util.md
Outdated
Show resolved
Hide resolved
Thanks @cbrnrd for the review. |
Release NotesThe applocker_evasion_install_util module has been added to the framework. It is designed to evade software restriction policies and Applocker. The main vector for this bypass is to use the trusted binary InstallUtil.exe in executing user supplied code. |
Intro
This module is designed to evade solutions such as software restriction policies and Applocker.
The main vector for this bypass is to use the trusted binary InstallUtil.exe in executing user supplied code.
This pull request is in reference to the previous pull request #8783.
Vulnerable Application
This evasion will work on all versions of Windows that include .net versions 3.5 or greater (note: ensure the selected payload matches the target os architecture).
Verification Steps
use evasion/windows/applocker_evasion_install_util
exploit