Defense Evasion
Check Defenses
# Defender Status
(Get-MpComputerStatus).RealTimeProtectionEnabled
# Language Mode
$ExecutionContext.SessionState.LanguageMode
# AppLocker
## From Registry
Get-ChildItem 'HKLM:Software\Policies\Microsoft\Windows\SrpV2'
Get-ChildItem 'HKLM:Software\Policies\Microsoft\Windows\SrpV2\Exe'
# From Get-AppLockerPolicy cmdlet
$policy = Get-AppLockerPolicy -Effective
$policy.RuleCollections
# From GPO
beacon> ldapsearch (objectClass=groupPolicyContainer) --attributes displayName,gPCFileSysPath
beacon> ls $gPCFileSysPath
beacon> download $gPCFileSysPath
PS> Parse-PolFile -Path $file.polEvasion
Check Binary
Obfuscate Binary
Cobalt Strike Profile
Cobalth Strike Artifacts & Resources
AppLocker Bypass
PowerShell CLM
Last updated