mattifestation
mattifestation
  • 16
  • 43 326

วีดีโอ

Demo 2: Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware EcosystemDemo 2: Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem
Demo 2: Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem
มุมมอง 266ปีที่แล้ว
REcon 2022 demo video #2: Demonstrating running arbitrary, unsigned code with MSBuild as an antimalware light protected process and killing the Defender AV antimalware light protected process.
Demo: AtomicTestHarnesses @ BSidesAugusta 2021Demo: AtomicTestHarnesses @ BSidesAugusta 2021
Demo: AtomicTestHarnesses @ BSidesAugusta 2021
มุมมอง 2683 ปีที่แล้ว
Talk Title: Confidently Measuring Attack Technique Coverage by Asking Better Questions Apologies for the demo fail during the talk. Here is a detailed demo of AtomicTestHarnesses showing off Invoke-ATHHTMLApplication and its corresponding Pester tests.
Auditing and Bypassing Windows Defender Application ControlAuditing and Bypassing Windows Defender Application Control
Auditing and Bypassing Windows Defender Application Control
มุมมอง 3.2K4 ปีที่แล้ว
www.twitch.tv/mattifestation/
Dynamic Analysis of Obfuscated Excel 4 MacrosDynamic Analysis of Obfuscated Excel 4 Macros
Dynamic Analysis of Obfuscated Excel 4 Macros
มุมมอง 1.6K4 ปีที่แล้ว
www.twitch.tv/mattifestation/ Analysis Notes: gist.github.com/mattifestation/15bd6bbb26becb2e49461400e7bd8c92
Building, Deploying, and Managing Multiple WDAC Policies with WDACToolsBuilding, Deploying, and Managing Multiple WDAC Policies with WDACTools
Building, Deploying, and Managing Multiple WDAC Policies with WDACTools
มุมมอง 2.7K4 ปีที่แล้ว
www.twitch.tv/mattifestation/
PowerShell Constrained Language Mode Enforcement and Bypass Deep DivePowerShell Constrained Language Mode Enforcement and Bypass Deep Dive
PowerShell Constrained Language Mode Enforcement and Bypass Deep Dive
มุมมอง 3.4K4 ปีที่แล้ว
www.twitch.tv/mattifestation
Obfuscated Script-based Malware Analysis with the Anti-Malware Scan Interface (AMSI)Obfuscated Script-based Malware Analysis with the Anti-Malware Scan Interface (AMSI)
Obfuscated Script-based Malware Analysis with the Anti-Malware Scan Interface (AMSI)
มุมมอง 1.7K4 ปีที่แล้ว
www.twitch.tv/mattifestation/
Integrating WDAC Block Rules and Intro to Multiple Policy ManagementIntegrating WDAC Block Rules and Intro to Multiple Policy Management
Integrating WDAC Block Rules and Intro to Multiple Policy Management
มุมมอง 2.5K4 ปีที่แล้ว
www.twitch.tv/mattifestation
Building a Windows Defender Application Control (WDAC) policy from scratch: User Mode Code IntegrityBuilding a Windows Defender Application Control (WDAC) policy from scratch: User Mode Code Integrity
Building a Windows Defender Application Control (WDAC) policy from scratch: User Mode Code Integrity
มุมมอง 12K4 ปีที่แล้ว
www.twitch.tv/mattifestation
Building a Windows Defender Application Control policy from scratch: Creating a driver allow listBuilding a Windows Defender Application Control policy from scratch: Creating a driver allow list
Building a Windows Defender Application Control policy from scratch: Creating a driver allow list
มุมมอง 7K4 ปีที่แล้ว
www.twitch.tv/mattifestation
Update: Automating the Process of Hijacking Digital Signature VerificationUpdate: Automating the Process of Hijacking Digital Signature Verification
Update: Automating the Process of Hijacking Digital Signature Verification
มุมมอง 4746 ปีที่แล้ว
An update to th-cam.com/video/9UfzybNMSB4/w-d-xo.html. The original video didn't have the portable executable SIP reset which could have led to some confusion. Demonstration of automating a digital signature verification hijack. Code available here: github.com/mattifestation/PoCSubjectInterfacePackage/blob/master/SIPHijack.ps1 Whitepaper: specterops.io/assets/resources/SpecterOps_Subverting_Tru...
Automating the Process of Hijacking Digital Signature VerificationAutomating the Process of Hijacking Digital Signature Verification
Automating the Process of Hijacking Digital Signature Verification
มุมมอง 8046 ปีที่แล้ว
An updated video can be found here: th-cam.com/video/C1K-6SQJ1rY/w-d-xo.html. The linked video shows a properly reset potable executable SIP as the attack occurs. Demonstration of automating a digital signature verification hijack. Code available here: github.com/mattifestation/PoCSubjectInterfacePackage/blob/master/SIPHijack.ps1 Whitepaper: specterops.io/assets/resources/SpecterOps_Subverting_...
Cloning a Certificate Chain, Trusting the Cloned Root, and Signing CodeCloning a Certificate Chain, Trusting the Cloned Root, and Signing Code
Cloning a Certificate Chain, Trusting the Cloned Root, and Signing Code
มุมมอง 2K6 ปีที่แล้ว
This video demonstrates how to clone a legitimate certificate chain, trust the cloned root certificate, and sign code with the cloned cert chain. This demonstrates the steps an attacker might take to blend in with legitmate, signed code.
Exporting a Certificate Chain to DiskExporting a Certificate Chain to Disk
Exporting a Certificate Chain to Disk
มุมมอง 3K6 ปีที่แล้ว
This video demonstrates the steps required to export a certificate chain (via the GUI) to disk so that the chain can be later cloned by an attacker for malicious purposes.

ความคิดเห็น

  • @fakefirmware
    @fakefirmware 5 หลายเดือนก่อน

    I appreciate these videos Ive learned a lot :) thanks Matt

  • @obaidooo
    @obaidooo ปีที่แล้ว

    Thanks for detailed video. Could you please through some lights on blocking batch files using WDAC.

  • @PeterScott-s6f
    @PeterScott-s6f ปีที่แล้ว

    Thank you for this video. But I am trying to setup a policy using a deny rule for a specific driver. I based my policy on the 'RecommendedDriverBlock_Enforce.xml' with some mods. I switched it to audit and trimmed it down to just the allow all and 1 deny rule for a driver by name. If the driver is set to a boot start driver, I see the event indicating it would have been blocked due to my policy Id. If I set it to manual start, and then start from a cmd line, I see no event. Going back to this video you posted, I can set it up with the 'allow' approach and do see the results I want. But is there a limitation to having a 'deny' approach and manually started drivers? Thanks!

  • @JesseMorgan24
    @JesseMorgan24 ปีที่แล้ว

    Thanks for the information. I'm just trying to get my posh profile to run in full language mode with a self-signed authenticode coding signing cert in my cert store I made from PowerShell with New-SelfSignedCertificate. Applocker reports allowing it but CLM remains because of the dot sourcing. I have no wish to run my terminal in admin mode all the time.

  • @briankelley8311
    @briankelley8311 2 ปีที่แล้ว

    Thank you for the video Matt, can you do one for unsigned DLL's?

  • @joshuaadigun4244
    @joshuaadigun4244 2 ปีที่แล้ว

    Hi Matt, great video. However, I have a question or I'd rather say a confusion as this is my first time implementing WDAC. I followed your tutorials and everything worked for me but that is an app we installed and performed a trace for. How can I go about apps already installed? I want to write a policy for tens of hundreds of software installed on my VM (for test purposes), how can I gather a trace of all these software and output them into a file? Or better still, how can I scan the entirety of my system for installed software and file so that U can create an allow list for some and then restrict some? Thanks in advance

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Hey, Joshua. To scan the entirety of a system, you'd start by calling `Get-SystemDriver -ScanPath C:\` and letting that run for a while. Then, to get at least an initial sense of the 3rd party signers available, consider doing a first run of `New-CIPolicy -DriverFiles $FilesFromGetSystemDriver -Level Publisher`. Because the output will likely be large and unruly, you're going to have to go through this process a few times in considering what you want or do not want in your final policy.

  • @quinla01
    @quinla01 2 ปีที่แล้ว

    Great video. Is there a way to add a publisher or hash rule to a policy without having a reference file? We have a lot of road warriors with laptops that, from time to time, need to run an executable that WDAC blocks. We collect Defender logs in Azure so I can see which file is blocked, the files publisher and SHA256 hash, but both the PowerShell commands and WDAC GUI Wizard need a reference file which I do not have.

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Unfortunately, the only way I know how to do that is by manually adding rules in the XML policy, which is error-prone. To create a publisher rule, you would need the TBS hash via the IssuerTBSHash field and the leaf certificate name via the PublisherName field. Experimentation will be required and you won't have a good way to test since you won't have the binary.

  • @chloeduan8301
    @chloeduan8301 2 ปีที่แล้ว

    Hi Matt! The thing I don't understand about supplemental policies is when there are multiple base policies. Say there are two base policies A and B, and a supplemental policy C that expands on A. For anything in the supplemental policy C to be allowed, wouldn't it also have to be allowed in base policy B? In this case, MSBlocked conveniently had AllowAll rules, but without that, then anything in MergedPolicy would not have been able to run unless it was allowed in in MSBlocked, is that the right understanding?

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      It's a good question and I honestly don't remember. I'd try experimenting a bit and refer to this documentation as a baseline: base policies union. It doesn't really answer your question but hopefully you'll have enough to experiment with. Sorry I couldn't offer a conclusive answer.

  • @chloeduan8301
    @chloeduan8301 2 ปีที่แล้ว

    I am getting value! Thank you Matt

  • @chloeduan8301
    @chloeduan8301 2 ปีที่แล้ว

    Hi Matt! For the event duplicate from the DefaultWindowsAudit base policy (th-cam.com/video/_osypUKBKAU/w-d-xo.html) , is it because DefaultWIndowsAudit did not explicitly ALLOW MSBuild.exe? MSBuild.exe is signed only by Microsoft Code Signing PCA 2011, with the EKUs Microsoft Publisher and Code Signing, not Windows System Component Verification. Not included means blocked, therefore, audited.

  • @akashupadhyayawow
    @akashupadhyayawow 2 ปีที่แล้ว

    very well explain , covered my concepts for working and defending WDAC. Thanks mate.

  • @fredericcuzon5194
    @fredericcuzon5194 2 ปีที่แล้ว

    Hello Matt, could you please provide a link of the previous video that you are mentioning at the start? Thank you

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Ah yes, of course! th-cam.com/video/fWPoWVN5yh4/w-d-xo.html Here's the full playlist: th-cam.com/play/PL2Xx-q-W5pKUNaNkakjZkLmfsNvMWPdNB.html

  • @chloeduan8301
    @chloeduan8301 2 ปีที่แล้ว

    Hi Matt! To create a base policy, I've come to a process where I: 1. run BasePolicy (originally DefaultWindows_Audit) on new machine (w/ all necessary files) 2. run New-CIPolicy -Audit -UserPEs -Level Hash to get (A) all audited hits (no duplicates) 3. run New-CIPolicy -Audit -UserPEs -Level Publisher -Fallback Hash to get (B) list of signers, (C) unsigned files = leftover allowed hashes in the .xml and (D) the list of signed files = diff of audit hits(A) and unsigned files (C); note that (D) should be signed by one of (B) 4. Add list of signers (B) to BasePolicy and repeat. An issue is that after multiple iterations of this, there are still "new signers" that pop up despite that is was already added in a previous iteration. For example, cert X showed in iteration2 therefore added to BasePolicy. In iteration3, Cert X still shows up (with diff thumbprint) even though it was already added. I've looked through the list of signed files (D) in iteration2 for their thumbprints and if they matched to the thumbprint of Cert X in iteration2 and 3. But neither match. Perhaps this thumbprint is different somehow? Or perhaps this is a case of an EKU value I'm lacking? Would love to get your thoughts on if this is a viable process to follow. Bonus question: is there a process for adding EKUs to the BasePolicy? Thanks so much

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Hey! Thanks for writing this all up. Unfortunately, I'd have a hard time offering any advice without seeing the policies and the corresponding CodeIntegrity events. The only certificate hashes you'll see in 3089 events are TBS hashes which aren't the same as thumbprint (which is a SHA1 hash and a different hashing algorithm). Perhaps you're talking about the same thing but calling it thumbprint? So IDK if that might be a source of trouble in troubleshooting the logs. Also as a sanity check, confirm that the policy was updated properly and that the PolicyHash in 3076/3077 events matches the expected policy file hash. Also, does the PolictGUID in the 3076/3077 event make sense? I can't say I've ever explicitly added EKUs to a policy. If I were to do that, I'd probably do it manually. This is the code I'd use to convert an OID into the value the EKU rule would expect: $EKUBytes = [Security.Cryptography.CryptoConfig]::EncodeOID('1.3.6.1.4.1.311.76.11.1') $EKUBytes[0] = 1 ($EKUBytes | % { $_.ToString('X2') }) -join '' Sorry I can't be of more assistance.

    • @chloeduan8301
      @chloeduan8301 2 ปีที่แล้ว

      @@mattifestation Yeah, I used' thumbprint" wrongly here. What I meant to say was that the Signer CertRoot Values are the same. My understanding was that the CertRoot Value in the policies correspond to the thumbprints of the certificate. I see now that's false. It's still not clear to me what that Value is -- is it the "TBS" hash of ... something that relates to the actual cert thumbprint? My naive assumption was that I could 1. see Allowed CertRoot Value and 2. match it to the thumbprint of the cert signing a file. I will definitely check on the events again to see if the update worked -- I am redeploying my machine each time so I am expecting an update. Currently not using the Policy GUID yet because on 1809 :/ Cool, awesome to get the confirmation from you on the EKUs. And thanks so much for the code, will definitely be using it to try it out. As a clarification though, the EKUs Allowed only scope on the Allowed signers in the Policy file, correct? So if I have a cert NOT allowed in the policy with an EKU allowed in the policy, the file signed by the cert will still not be allowed to run in Enforce mode? Thanks so much for spending the time. Greatly appreciated.

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      @@chloeduan8301 My pleasure. Correct. Any deny rule will always take precedence over an allow rule. Thumbprint vs. TBS hash is certainly confusing. I don't know the difference between how those hashes are calculated, I just know that they are both hashes of the certificate. I've had to troubleshoot TBS hashes enough that I wrote Get-TbsHash which will display the TBS hash of a certificate. gist.github.com/mattifestation/660d7e17e43e8f32c38d820115274d2e Take care. -Matt

  • @chloeduan8301
    @chloeduan8301 2 ปีที่แล้ว

    Thank you so much for the video! I had a question: How come the VMWare.xml created did not have a PolicyID? Is that only for the template policies Windows provides? Thanks again!

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Hey, good question. A policy file will only have a PolicyID is it was built to support multiple policies. So you'd have to supply the -MultiplePolicyFormat switch with New-CIPolicy to generate that. Here's an example of that in MS docs: docs.microsoft.com/en-us/powershell/module/configci/new-cipolicy?view=windowsserver2022-ps#example-1-create-a-policy-in-multiple-policy-format I hope that helps!

    • @chloeduan8301
      @chloeduan8301 2 ปีที่แล้ว

      @@mattifestation ​ Thanks so much for the reply! I will definitely try that. However currently, I seem to be stuck on the DenyAllAudit.xml policy part. After setting that policy, and rebooting, my Azure VM doesn't seem to boot anymore ("vm agent status not ready", but vm still running). From your video, it seems like your vm boot rather quickly, I'm thinking it might have something to do with the overload of telemetry for the Audit of all files. Did you ever run into this problem or did you just allocated more resources for your VM to be able to handle the reboot data? (if this is the issue)

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      @@chloeduan8301 Out of curiosity, are you running a Server 2019 VM? If so, deployment of the deny all policy is an unfortunate, known issue. github.com/mattifestation/WDACTools/issues/5#issuecomment-1078767703 Could you try to deploy C:\Windows\schemas\CodeIntegrity\ExamplePolicies\DefaultWindows_Audit.xml as a test? Does that allow the VM to boot and does it log events?

    • @chloeduan8301
      @chloeduan8301 2 ปีที่แล้ว

      @@mattifestation Yes! That's exactly what I am using - the Windows Server 2019 Gen2 VM. Thanks for the thread, seems like that's what is causing the problem. Tried the DefaultWindows_Audit.xml and it does allow the VM to boot, and doesn't report any kernel events other than Windows\System32\drivers\mlx5.sys, even with the WHQL signers removed, which I am assuming is expected? After another look, the file is Authenticode-Signed and Microsoft-Signed, so I wonder why it caught it in the first place🤔

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      @@chloeduan8301 Great! I'm glad we're on the same page then. I can't speak for what might be expected to create audit events in Azure VMs but even with WHQL rules removed, I would expect very few drivers to be logged in a stock VM. Most of the built-in driver ought to be Windows-signed.

  • @kamilolah4986
    @kamilolah4986 2 ปีที่แล้ว

    Note: a policy will only put PowerShell into Constrained Language mode if it is in Enforced mode. In Audit mode, PowerShell remains in Full Language mode. 1:19:15

  • @kamilolah4986
    @kamilolah4986 2 ปีที่แล้ว

    Just one commend rules are merged as well only and it was merged in your video as well :-). Compare 44:50 with 1:06:00 result 1:08:37. You will see that Rules are merged as well. I believe only settings like name and Id will stay from the first one.

  • @scarmentube
    @scarmentube 2 ปีที่แล้ว

    Thank you so much for another great video! I do have another question if you don’t mind: Do you know a good way to gather a list of all files authorized by Microsoft ISG? When a file is not authorized by ISG we get the 3091 or 3092 events on event viewer. In order to check if a file was authorized, we need to use the “fsutil” tool and we need to have the Ea Name with the value: KERNEL SMARTLOCKER ORIGINCLAIM So, would it be possible to create a list of all files with EA Name equals KERNEL SMARTLOCKER ORIGINCLAIM? Any idea is very welcome and appreciated. Thanks in advance!

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Hey! Using James Forshaw's NtObjectManager module (www.powershellgallery.com/packages/NtObjectManager/1.1.33), you can retrieve extended attributes. Here's something you could play with to attempt to generate such a list (I haven't tested this on a WDAC system so your mileage may vary): ls C:\ -Recurse -ErrorAction SilentlyContinue | Where-Object { $File = Get-NtFile -Path $_.FullName -Win32Path -Access ReadEa -ErrorAction SilentlyContinue if ($File) { $ExtendedAttributes = $File.GetEa() $ExtendedAttributes.Entries | Where-Object { $_.Name -eq '$Kernel.Smartlocker.OriginClaim' } } }

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Run that from elevated PowerShell, BTW.

    • @scarmentube
      @scarmentube 2 ปีที่แล้ว

      @@mattifestation , Awesome! Thank you so much!

  • @madhuperera5274
    @madhuperera5274 2 ปีที่แล้ว

    Thank you very much for making this splendid video. Really helpful.

  • @gurpwindoo1928
    @gurpwindoo1928 2 ปีที่แล้ว

    Instead of 11, meaningful names like 'xlCellTypeLastCell' can be used as per the xlSpecialCellsValue enumeration.

    • @gurpwindoo1928
      @gurpwindoo1928 2 ปีที่แล้ว

      At least, it would work in VBA. Haven't tried it in PowerShell.

  • @scarmentube
    @scarmentube 2 ปีที่แล้ว

    Thanks for the video, really appreciate it! Could you please share the link you mentioned on the video to the signing levels documentation by Alex? Thanks in advance.

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      Certainly! www.crowdstrike.com/blog/protected-processes-part-3-windows-pki-internals-signing-levels-scenarios-signers-root-keys/ And they're all defined in WDACTools here: github.com/mattifestation/WDACTools/blob/master/WDACAuditing.psm1#L23-L44

    • @scarmentube
      @scarmentube 2 ปีที่แล้ว

      @@mattifestation , thank you so much for all the good knowledge! Enjoy life :-)!

    • @fredericcuzon5194
      @fredericcuzon5194 2 ปีที่แล้ว

      @@mattifestation Thank you!

  • @webcomment8895
    @webcomment8895 2 ปีที่แล้ว

    Does Package Inspector work with MSI installers? If not, what do you do if the installer is an MSI instead of an EXE?

    • @mattifestation
      @mattifestation 2 ปีที่แล้ว

      It does work with MSI installers. Give it a try and if it doesn't work, feel free to post a response with details describing the issue. Thanks!

  • @michaelwaterman3553
    @michaelwaterman3553 2 ปีที่แล้ว

    Lots of info, but very good. Thanks!

  • @michaelwaterman3553
    @michaelwaterman3553 2 ปีที่แล้ว

    Thanks, very good video! Needed this info.

  • @Taylorwinning92
    @Taylorwinning92 3 ปีที่แล้ว

    Any idea why my Enforce Allow All policy is still causing issues with a script related to a COM object? The script contains an ActiveXObject declaration. I know ActiveX is out of development etc, I've messed with IE11 settings but can't get it to work. Completely unable to get this working even though the policy is Allow All (any enforce policy causes this). It just seems weird that something still seems to either be blocked or at least inhibited by the allow all policy? Any ideas?

    • @mattifestation
      @mattifestation 3 ปีที่แล้ว

      There's a fixed set of COM CLSIDs that are supported when a policy is in enforcement mode. Here is a list of them. gist.github.com/bohops/26c706bed7116d111d0fe38e4197b5f8 Those CLSIDs are validated in the WldpIsClassInApprovedList function (docs.microsoft.com/en-us/windows/win32/devnotes/wldpisclassinapprovedlist). There is documentation that covers COM class allowlist in a WDAC policy. It can be found here: docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy I don't have experience with COM class configuration in WDAC policies so your mileage may vary. Good luck!

  • @UmArKhAn29
    @UmArKhAn29 3 ปีที่แล้ว

    Awesome, This video is worth the time ! Just to add we can also use Internet Security Graph (ISG) to block the applications with Bad or No reputation data and that can be added as a rule in XML policy (Using Intune as well)

  • @hippogambler
    @hippogambler 3 ปีที่แล้ว

    Hi! MS recently released a new portion of blocking rules for vulnerable drivers. docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules. Merging it with DefaultWindows policy does make policy allow everything. At least in User mode. Have tested this on some exe files which previously where blocked by DefaultWindows. The policy is in enforce mode. UMCI rule is in place. It does not make any sense. Have someone faced something similar?

    • @mattifestation
      @mattifestation 3 ปีที่แล้ว

      Oh thank you so much for bringing this to my attention! This is great!!!

    • @hippogambler
      @hippogambler 3 ปีที่แล้ว

      @@mattifestation it would be great if you could help with that.

    • @hippogambler
      @hippogambler 3 ปีที่แล้ว

      @mattifestation I found that ALLOW_ALL rule is presented in policy. For what purpose? It does not make any sense.

    • @mattifestation
      @mattifestation 3 ปีที่แล้ว

      @@hippogambler Hey can you point me to the time in the video where I mention that? I haven't thought about this subject for a while so I could use some assistance to jog my memory. Thank you

    • @hippogambler
      @hippogambler 3 ปีที่แล้ว

      @@mattifestation you did not mention that. I just saying that the new blocking portion of tules provided by ms, what i mention above, is not working, becase it has some allow_all rules. And i was asking you about some help, to underdtand, is this a bug or feature. 😄

  • @PeteAUS1983
    @PeteAUS1983 4 ปีที่แล้ว

    Great guide but seriously Ivanti Application Control or Carbon Black can do this from a central location and push the config to all machines without the need for any commands, everything you done here can be done in a few minutes with either product.

    • @mattifestation
      @mattifestation 4 ปีที่แล้ว

      Thank you for kind words, Pete. I would definitely encourage you to seize this opportunity to make similar videos or blogs posts if you haven't already highlighting just how easy it is, perhaps convincing your audience that the cost incurred is worth it over free.

    • @hippogambler
      @hippogambler 3 ปีที่แล้ว

      There is no kernel mode application control and HVCI protection in Ivanti. So if attacker will have admin rights on target machine he will easily override blocking rules. And also native software mostly is better then 3rd party. WDAC can also be managed from central location - AD GPO. Of course the administration is worse without centralized GUI where you can easily apply changes.

    • @PeteAUS1983
      @PeteAUS1983 3 ปีที่แล้ว

      @@hippogambler while it is missing those features with the product configured in the correct manner you can still lock out admins from making changes and go as far and restricting the change in services. You cant have WDAC is your only level of security on a system, e.g use LAPS change the admin password, in some environments, they are completely air-gapped But each to their own. every time we demo the different products WDAC always looses out due to admin overhead.

    • @hippogambler
      @hippogambler 3 ปีที่แล้ว

      @@PeteAUS1983 i agree that WDAC in most cases will be admin overhead because it did not have cenrolized gui management. but in some cases where we have for example Windows server withe some roles installed and ther is no 3rd party software excluding AV or some EDR, then it can be used without pain in the ass. i suppose.

  • @hippogambler
    @hippogambler 4 ปีที่แล้ว

    Hi. I woneder, if the path to the driver file in CI policy is not important? File name either? So the only parameters that is checked is the file vsrsion an signer?

    • @mattifestation
      @mattifestation 4 ปีที่แล้ว

      Hey. Validating against file version and signer is an effective check but file name and path rules are possible, just at decreased security. This article covers all the configuration options: docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-file-rule-levels

    • @hippogambler
      @hippogambler 4 ปีที่แล้ว

      @@mattifestation thanks for the fast answer. But i mean the paths in your example. You have puted the vmware files in some test directory and then scan it. And then the file paths are reflected in the policy. But when the windows starts the drivers are laded from the system32 directory. So the path in the policy is not conidered.

    • @mattifestation
      @mattifestation 4 ปีที่แล้ว

      @@hippogambler Ah are you referring to the FriendlyName attribute in the policy XML? If so, that is just a human-readable note to annotate where the file originated from but that attribute is discarded when converted to binary form (.p7b). You can change/remove FriendlyName attributes with no affect on the policy.

    • @hippogambler
      @hippogambler 4 ปีที่แล้ว

      @@mattifestation Yes, exactly, FriendlyName. I did not pay attention to name of this attribute. Just spotted a file path in the xml and thought that it should be important.

  • @donaldduck6198
    @donaldduck6198 4 ปีที่แล้ว

    Isn't it risky to open the workbook like this? Have you tried the python code "Excel4Macro deobfucator", it runs also on Linux. (iterate all cells: for each c in activesheet.usedrange.specialcells(2))

  • @sunny_disposition
    @sunny_disposition 4 ปีที่แล้ว

    Cookie Clicker Excel Edition. No but in all seriousness, thanks for sharing. Love the ps com introspection stuff which is particularly hard to self teach in my experience.

  • @valleyview5417
    @valleyview5417 5 ปีที่แล้ว

    Where can we download MSKernel32Root.cer ?

    • @mattifestation
      @mattifestation 5 ปีที่แล้ว

      Hey. All the instructions for this process are documented in my blog post: posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec

    • @valleyview5417
      @valleyview5417 5 ปีที่แล้ว

      @@mattifestation Thank's nice blog, here in my W7 kernel32.DLL is not digitally signed

    • @mattifestation
      @mattifestation 5 ปีที่แล้ว

      @@valleyview5417 It's probably catalog-signed. Run Get-AuthenticodeSignature on it in PowerShell and this post will offer some more info on catalog signing: www.exploit-monday.com/2017/08/application-of-authenticode-signatures.html

    • @valleyview5417
      @valleyview5417 5 ปีที่แล้ว

      @@mattifestation Thank's for help

  • @21jersh
    @21jersh 5 ปีที่แล้ว

    Return of the matt (top of the world)