Skip to content

[Suggestion]: Block LOLBin/LOLBas access to internet via Windows Firewall #706

@Raieverr

Description

@Raieverr

Are you sure the Security measure is not already implemented?

  • Yes, I have checked and the Security measure I'm suggesting to be implemented is not duplicate. 🫡

Please explain your new Security measure suggestion

Back again with a suggestion this time! 👋🏻

I want to suggest a new function to block outbound internet access for common LOLBins/LOLBas using Windows Firewall. This old-school technique can be added as a misc. Item or under the Firewall section, or... A handful of sections, but that's beside the point.

These binaries (e.g., certutil.exe, mshta.exe, wmic.exe, etc.) are frequently abused in post-exploitation stages for C2 and data exfiltration, and blocking their outbound traffic via Windows Firewall would help harden systems by preventing these tools from being used to reach the internet, while still allowing their use for internal operations where necessary.

A prime example is the ClickFix malware attacks, abusing MSHTA and Win+R run commands. Rather than disabling Win+R, you can block outbound MSHTA, and boom. The entire attack is dead. Ideally, this would be implemented as a configurable option or profile toggle for more flexible environments. A sample list of items that are commonly restricted by other utilities:

C:\Windows\System32\bitsadmin.exe
C:\Windows\System32\certreq.exe
C:\Windows\System32\certutil.exe
C:\Windows\System32\cmstp.exe
C:\Windows\System32\cmd.exe
C:\Windows\System32\cscript.exe
C:\Windows\System32\forfiles.exe
C:\Windows\System32\hh.exe
C:\Windows\System32\mshta.exe
C:\Windows\System32\msiexec.exe
C:\Windows\System32\netsh.exe
C:\Windows\System32\powershell.exe
C:\Windows\System32\presentationhost.exe
C:\Windows\System32\reg.exe
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\rundll32.exe
C:\Windows\System32\schtasks.exe
C:\Windows\System32\wscript.exe
C:\Windows\System32\wmic.exe
C:\Windows\System32\xwizard.exe
C:\Windows\SysWOW64\bitsadmin.exe
C:\Windows\SysWOW64\certreq.exe
C:\Windows\SysWOW64\certutil.exe
C:\Windows\SysWOW64\cmstp.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cscript.exe
C:\Windows\SysWOW64\forfiles.exe
C:\Windows\SysWOW64\hh.exe
C:\Windows\SysWOW64\mshta.exe
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\SysWOW64\netsh.exe
C:\Windows\SysWOW64\powershell.exe
C:\Windows\SysWOW64\presentationhost.exe
C:\Windows\SysWOW64\reg.exe
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\SysWOW64\wscript.exe
C:\Windows\SysWOW64\wmic.exe
C:\Windows\SysWOW64\xwizard.exe

Per usual, thank you for your amazing work and awesome applications! We, the community, greatly appreciate you!

Metadata

Metadata

Assignees

Labels

Harden System Security 🔱Any item labeled with this is related to the Harden System Security application.Suggestion ⚡Label used to describe New Security Measure Suggestions

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions