Ultimate WDAC Bypass List
A centralized resource for previously documented WDAC/Device Guard/UMCI bypass techniques as well for building/managing/testing WDAC policies
*Many of the LOLBINs are included on the Microsoft Recommended Block Rules List
*This repository was inspired by Oddvar Moe's Ultimate AppLocker Bypass List
*This is a work in progress...
Microsoft Recommended Block Rules - "LOLBIN" Write-Ups
addinprocess.exe
- By James Forshaw (@tiraniddo)
- DG on Windows 10 S: Executing Arbitrary Code
addinprocess32.exe
- By James Forshaw (@tiraniddo)
- DG on Windows 10 S: Executing Arbitrary Code
aspnet_compiler.exe
- By cpl (@cpl3h)
- The Curious Case of Aspnet_Compiler.exe
bginfo.exe
- By Oddvar Moe (@Oddvarmoe)
- Bypassing Application Whitelisting with BGInfo
cdb.exe
- By Matt Graeber (@mattifestation)
- Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner
csi.exe
- By Casey Smith (@subTee)
- Application Whitelisting Bypass - CSI.EXE C# Scripting
dbghost.exe
- By Casey Smith (@subTee)
- dbghost.exe - Ghost And The Darkness
dnx.exe
- By Matt Nelson (@enigma0x3)
- BYPASSING APPLICATION WHITELISTING BY USING DNX.EXE
dotnet.exe
- By Jimmy Bayne (@bohops)
- DotNet Core: A Vector For AWL Bypass & Defense Evasion
fsi.exe
- By Nick Tyrer (@NickTyrer) [Write-up: Jimmy Bayne (@bohops)]
- GitHub Gist: fsi.exe inline execution
- Exploring the WDAC Microsoft Recommended Block Rules (Part II): Wfc.exe, Fsi.exe, and FsiAnyCpu.exe
fsiAnyCpu.exe
- By Nick Tyrer (@NickTyrer) via fsi.exe inline execution [Write-up: Jimmy Bayne (@bohops)]
- GitHub Gist: fsi.exe inline execution
- Exploring the WDAC Microsoft Recommended Block Rules (Part II): Wfc.exe, Fsi.exe, and FsiAnyCpu.exe
infdefaultinstall.exe
- By Kyle Hanslovan (@KyleHanslovan), Chris Bisnett (@chrisbisnett)
- Evading Autoruns - DerbyCon 7.0
- RE: Evading Autoruns PoCs on Windows 10
InstallUtil.exe
- James Forshaw (@tiraniddo)
- DG on Windows 10 S: Abusing InstallUtil
kill.exe
- By @hyp3rlinx
- Microsoft Process Kill Utility "kill.exe" - SEH Buffer Overflow
microsoft.Workflow.Compiler.exe
- By Matt Graeber (@mattifestation)
- Arbitrary, Unsigned Code Execution Vector in Microsoft.Workflow.Compiler.exe
msbuild.exe
- By Casey Smith (@subTee)
- Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations
mshta.exe
- By Unknown (Documented by @conscioushacker)
- Application Whitelisting Bypass: mshta.exe
powershellcustomhost.exe
- By Lasse Trolle Borup (@TrolleBorup)
- A simple Device Guard bypass
rcsi.exe
- By Matt Nelson (@enigma0x3)
- BYPASSING APPLICATION WHITELISTING BY USING RCSI.EXE
runscripthelper.exe
- By Matt Graeber (@mattifestation)
- Bypassing Application Whitelisting with runscripthelper.exe
visualuiaverifynative.exe
- By Lee Christensen (@tifkin_) [Write-up: Jimmy Bayne (@bohops)]
- Exploring the WDAC Microsoft Recommended Block Rules: VisualUiaVerifyNative
wfc.exe
- Tipped by MSRC and Matt Graeber (@mattifestation) [Write-up: Jimmy Bayne (@bohops)]
- Exploring the WDAC Microsoft Recommended Block Rules (Part II): Wfc.exe, Fsi.exe, and FsiAnyCpu.exe
- https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/
windbg.exe
- By Matt Graeber (@mattifestation)
- Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner
wmic.exe
- By Casey Smith (@subTee)
- WMIC.EXE Whitelisting Bypass - Hacking with Style, Stylesheets
WSL Family - bash.exe, lxrun.exe, wsl.exe, wslconfig.exe, wslhost.exe
- By Alex Ionescu (@aionescu)
- Fun with the Windows Subsystem for Linux
On Block List - Not Documented Yet...
- addinutil.exe
- dbgsvc.exe
- IntuneWindowsAgent.exe
- kd.exe
- ntkd.exe
- ntsd.exe
- texttransform.exe
Libraries On List (Independent usage may/may not be interesting)
- Microsoft.Build.dll
- Microsoft.Build.Framework.dll
- msbuild.dll
- lxssmanager.dll
- system.management.automation.dll
Other "Unsigned Code Execution" LOLBINs (not on list)
dbgsrv.exe
- By Casey Smith (@subTee) , Ross Wolf (@rw_access)
- How to Bypass WDAC with dbgsrv.exe
- Fantastic Red-Team Attacks and How to Find Them
PowerShell
UMCI BYPASS USING PSWORKFLOWUTILITY: CVE-2017-0215
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2017/10/19/umci-bypass-using-psworkflowutility-cve-2017-0215/
DEFEATING DEVICE GUARD: A LOOK INTO CVE-2017-0007
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2017/04/03/defeating-device-guard-a-look-into-cve-2017-0007/
Exploiting PowerShell Code Injection Vulnerabilities to Bypass Constrained Language Mode
- By Matt Graeber (@mattifestation)
- http://www.exploit-monday.com/2017/08/exploiting-powershell-code-injection.html
A LOOK AT CVE-2017-8715: BYPASSING CVE-2017-0218 USING POWERSHELL MODULE MANIFESTS
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2017/11/06/a-look-at-cve-2017-8715-bypassing-cve-2017-0218-using-powershell-module-manifests/
CVE-2018-8212: DEVICE GUARD/CLM BYPASS USING MSFT_SCRIPTRESOURCE
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2018/10/10/cve-2018-8212-device-guard-clm-bypass-using-msft_scriptresource/
Invoke-History Constrained Language Mode Bypass
- By Matt Graeber (@mattifestation)
- https://twitter.com/mattifestation/status/1095416185053696000
Novel Living-Of-The-Land/COM/Microsoft Office/Active Scripting Languages (jscript.dll, msxml3.dll, msxml6.dll)
Bypassing Device Guard with .NET Assembly Compilation Methods
- By Matt Graeber (@mattifestation)
- http://www.exploit-monday.com/2017/07/bypassing-device-guard-with-dotnet-methods.html
Sneaking Past Device Guard (+ CVE-2018-8417)
- By Philip Tsukerman (@PhilipTsukerman)
- https://conference.hitb.org/hitbsecconf2019ams/materials/D2T1%20-%20Sneaking%20Past%20Device%20Guard%20-%20Philip%20Tsukerman.pdf
WLDP CLSID policy .NET COM Instantiation UMCI Bypass
- By James Forshaw (@tiraniddo)
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1514&q=
WSH INJECTION: A CASE STUDY
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/
Application Whitelisting Bypass and Arbitrary Unsigned Code Execution Technique in winrm.vbs
- By Matt Graeber (@mattifestation)
- https://posts.specterops.io/application-whitelisting-bypass-and-arbitrary-unsigned-code-execution-technique-in-winrm-vbs-c8c24fb40404
COM XSL Transformation: Bypassing Microsoft Application Control Solutions (CVE-2018-8492)
- By Jimmy Bayne (@bohops)
- https://bohops.com/2019/01/10/com-xsl-transformation-bypassing-microsoft-application-control-solutions-cve-2018-8492/
Abusing Catalog Hygiene to Bypass Application Whitelisting
- By Jimmy Bayne (@bohops)
- https://bohops.com/2019/05/04/abusing-catalog-file-hygiene-to-bypass-application-whitelisting/
BYPASSING DEVICE GUARD UMCI USING CHM – CVE-2017-8625
- By Oddvar Moe (@Oddvarmoe), Matt Nelson (@enigma0x3)
- https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/
UMCI VS INTERNET EXPLORER: EXPLORING CVE-2017-8625
- By Matt Nelson (@enigma0x3)
- https://enigma0x3.net/2017/08/24/umci-vs-internet-explorer-exploring-cve-2017-8625/
Bypassing WDAC with Previous Versions of Signed Script Hosts & Signature Catalog Files
- By William Easton (@strawgate)
- https://github.com/strawgate/Advisories/blob/main/Microsoft/VULN-051861.md
Defense, Policy Creation, Testing, & Research
WDAC Twitch Stream
- Fantastic videos collection that covers WDAC Policy Creation/Enforcement/Bypass/Audit/Etc.
- By Matt Graeber (@mattifestation)
- https://www.youtube.com/playlist?list=PL2Xx-q-W5pKUNaNkakjZkLmfsNvMWPdNB
WDAC Policy Wizard
- Documentation and tools to access Windows Defender Application Control (WDAC) technology
- By Microsoft Docs
- https://github.com/MicrosoftDocs/WDAC-Toolkit
WDACTools
- A PowerShell module to facilitate building, configuring, deploying, and auditing Windows Defender Application Control (WDAC) policies
- By Matt Graeber (@mattifestation)
- https://github.com/mattifestation/WDACTools
WDACPolicies
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies
- By Matt Graeber (@mattifestation)
- https://github.com/mattifestation/WDACPolicies
Building a Windows Defender Application Control Lab
- By FortyNorth Security (@FortyNorthSec)
- https://fortynorthsecurity.com/blog/building-a-windows-defender-application-control-lab/
Documenting and Attacking a Windows Defender Application Control Feature the Hard Way — A Case Study in Security Research Methodology
- By Matt Graeber (@mattifestation)
- https://posts.specterops.io/documenting-and-attacking-a-windows-defender-application-control-feature-the-hard-way-a-case-73dd1e11be3a
WinAWL
- Windows Application Control Notes and Sample Policies
- By Brian in Pittsburgh (@arekfurt)
- https://github.com/arekfurt/WinAWL
Exploit Monday Blog
- By Matt Graeber (@mattifestation)
- http://www.exploit-monday.com/
Quick Steps for Deploying a Policy & Setting Up a WDAC Test Machine
- By Jimmy Bayne (@bohops)
- https://github.com/bohops/Notes/tree/master/Windows/WDAC-DeviceGuard