AppLocker
Brief
Check
# check if it is running
Get-AppLockerPolicy -Effective | select -ExpandProperty RuleCollections
# check which files/extensions are blacklisted/whitelisted:
Get-ApplockerPolicy -Effective -xml
$a = Get-ApplockerPolicy -effective
$a.rulecollectionsByPass
If AppLocker is configured with default AppLocker rules, we can bypass it by placing our executable in the following directory: C:\Windows\System32\spool\drivers\color - Whitelisted by default.
If AppLocker is configured with default AppLocker rules, we can bypass it by placing our executable in the following directory: C:\Windows\System32\spool\drivers\color - Whitelisted by default.
Default writeable folders
Alternate Data Stream
Another technique that can be used to bypass AppLocker is by embedding an executable into another file (alternate data stream) and then executing the EXE from the ADS.
Last updated
Was this helpful?
