module

Applocker Evasion - Microsoft Workflow Compiler

Disclosed
N/A
Created
2019-09-11

Description

This module will assist you in evading Microsoft
Windows Applocker and Software Restriction Policies.
This technique utilises the Microsoft signed binaries
Microsoft.Workflow.Compiler.exe to execute user supplied code.

Authors

Nick Tyrer @NickTyrer
Matt Graeber

Platform

Windows

Architectures

x86, x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use evasion/windows/applocker_evasion_workflow_compiler
msf evasion(applocker_evasion_workflow_compiler) > show actions
...actions...
msf evasion(applocker_evasion_workflow_compiler) > set ACTION < action-name >
msf evasion(applocker_evasion_workflow_compiler) > show options
...show and set options...
msf evasion(applocker_evasion_workflow_compiler) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.