Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Adventures with Applocker, CLM, UAC
Setting up the Applocker
Setting up Applocker (7:25)
Enumerating Applocker rules
Enumerating the applocker policy (9:54)
Bypassing Default Rules
Bypassing default rules (10:00)
Bypassing File Hash Rules
Bypassing file hash condition rules (4:02)
Bypassing with LOLBins
Bypassing Default Rules with InstallUtil (5:17)
Running .net binaries with MSBuild (3:26)
Bypassing Constrained Language Mode
Downgrading Powershell (3:48)
Powershell as a new process (5:03)
Bypassing User Account Control (UAC)
Auto elevated binaries (2:19)
Abusing fodhelper (2:59)
Bypassing defender by modifying fodhelper exploit (3:02)
Bypassing AMSI
Patching AmsiScanBuffer (18:36)
LAPS
LAPS (8:07)
LAPS Backdoor by modifying AdmPwd.PS.dll (6:09)
Teach online with
Powershell as a new process
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock