• Stars
    star
    112
  • Rank 312,240 (Top 7 %)
  • Language
  • License
    MIT License
  • Created about 8 years ago
  • Updated over 7 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses

DeviceGuardBypassMitigationRules

A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses.

As new Device Guard configuration bypasses are published, this reference policy will be updated with deny rules for the offending binaries. Generally speaking, the rules that will be published here will reflect signed Microsoft user-mode binaries that circumvent user-mode code integrity (UMCI). All code integrity policies will require that Microsoft binaries be trusted to a great extent, therefore it is reasonable to assume that a binary that executes arbitrary, unsigned code is a valid device guard configuration bypass.

If you believe this is missing a published bypass, please file a GitHub issue linking to the published bypass. I also ask that you validate these rules on your system. I can only obtain so many versions of the bypass binaries so there may be a version out there that was signed with a different code signing certificate that I'm not tracking. If that's the case, pelase let me know, provide the binary, and I will promptly update the policy. Thank you!

You can use the following code snippet to easily merge this policy with your existing code integrity policy:

# The path to the denial policy from the GitHub repo
$DenialPolicyFilePath = 'BypassDenyPolicy.xml'

# Replace this with the file path of the policy you're using
$ReferencePolicyFilePath = 'ReferencePolicy.xml'

# Name this whatever you want
$MergedPolicyFilePath = 'ReferencePolicyWithMitigations.xml'

# Parse the rules from the denial policy
$DenyRules = Get-CIPolicy -FilePath $DenialPolicyFilePath

# Merge the rules into a new, merged code integrity policy
Merge-CIPolicy -OutputFilePath $MergedPolicyFilePath -PolicyPaths $ReferencePolicyFilePath -Rules $DenyRules

For additional background on creating and merging deny rules, please refer to my blog post on the subject.

More Repositories

1

PowerShellArsenal

A PowerShell Module Dedicated to Reverse Engineering
PowerShell
830
star
2

CimSweep

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.
PowerShell
637
star
3

PIC_Bindshell

Position Independent Windows Shellcode Written in C
PowerShell
279
star
4

WMI_Backdoor

A PoC WMI backdoor presented at Black Hat 2015
PowerShell
269
star
5

PSSysmonTools

Sysmon Tools for PowerShell
PowerShell
227
star
6

PSReflect

Easily define in-memory enums, structs, and Win32 functions in PowerShell
PowerShell
212
star
7

WDACTools

A PowerShell module to facilitate building, configuring, deploying, and auditing Windows Defender Application Control (WDAC) policies
PowerShell
175
star
8

WinPETools

A module designed to simplify the creation, customization, and deployment of bootable Windows Preinstallation Environment (WinPE) images.
PowerShell
144
star
9

BHUSA2018_Sysmon

All materials from our Black Hat 2018 "Subverting Sysmon" talk
PowerShell
138
star
10

AntimalwareBlight

Execute PowerShell code at the antimalware-light protection level.
PowerShell
130
star
11

PoCSubjectInterfacePackage

A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.
PowerShell
94
star
12

BCD

BCD is a module to interact with boot configuration data (BCD) either locally or remotely using the ROOT/WMI:Bcd* WMI classes. The functionality of the functions in this module mirror that of bcdedit.exe.
PowerShell
61
star
13

WDACPolicies

A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies
52
star
14

TCGLogTools

A set of tools to retrieve and parse TCG measured boot logs. Microsoft refers to these as Windows Boot Confirguration Logs (WBCL). In order to retrieve these logs, you must be running at least Windows 8 with the TPM enabled.
PowerShell
49
star
15

WindowsEventLogMetadata

Event metadata collected across all manifest-based ETW providers on Window 10 1903
30
star
16

ShellcodeExec

A simple shellcode runner
C
23
star
17

CatalogTools

A PowerShell module to assist in parsing and managing catalog files.
PowerShell
18
star
18

UnicornPowerShell

A PowerShell binding for the Unicorn Engine
PowerShell
14
star
19

MSFTTraceMessageFormat

All TMF files that I extracted from Microsoft PDBs.
11
star
20

mattifestation

1
star