You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: IntroClassFiles/Tools/IntroClass/AppLocker/AppLocker.md
+21-49Lines changed: 21 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,101 +1,74 @@
1
1
2
2
# AppLocker
3
3
4
-
5
4
Applocker Instructions:
6
5
7
-
Let’s see what happens when we do not have AppLocker running. We will set up a simple backdoor and have it connect back to the Ubuntu system. Remember, the goal is not to show how we can bypass EDR and Endpoint products. It is to create a simple backdoor and have it connect back.
6
+
Let’s see what happens when we do not have **AppLocker** running. We will set up a simple backdoor and have it connect back to the **Ubuntu** system. Remember, the goal is not to show how we can bypass **EDR** and **Endpoint** products. It is to create a simple backdoor and have it connect back.
8
7
9
-
Before we begin, we need to disable Defender. Start by opening an instance of Windows Powershell. Do this by clicking on the Powershell icon in the taskbar.
8
+
Before we begin, we need to disable **Defender**. Start by opening an instance of Windows **Powershell**. Do this by clicking on the **Powershell** icon in the taskbar.
10
9
11
10

12
11
13
-
Next, run the following command in the Powershell terminal:
12
+
Next, run the following command in the **Powershell** terminal:
If you get angry red errors, that is Ok, it means Defender is not running.
20
+
If you get angry red errors, that is ==**Ok**==, it means **Defender** is not running.
22
21
23
-
Let’s get started by opening a Kali instance.
22
+
Let’s get started by opening a **Kali** instance.
24
23
25
24

26
25
27
-
Alternatively, you can click on the Kali icon in the taskbar.
26
+
Alternatively, you can click on the **Kali** icon in the taskbar.
28
27
29
28

30
29
31
-
####NOTE#####
32
-
33
-
If you are having trouble with Windows Terminal, you can simply start each of the three shells, we use by starting them directly from the Windows Start button.
34
-
35
-
36
-
37
-
Simply click the Windows Start button in the lower left of your screen and type:
38
-
39
-
40
-
41
-
`Powershell`
42
-
43
-
or
44
-
45
-
`Ubuntu`
46
-
47
-
or
48
-
49
-
`Command Prompt`
50
-
51
-
52
-
53
-
For PowerShell and Command Prompt, please right click on them and select Run As Administrator
54
-
55
-
###END NOTE###
56
-
57
30
Let's start by getting root access in our terminal.
58
31
59
-
<pre>sudo su -</pre>
32
+
`sudo su -`
60
33
61
34
Next, lets run the following command to get our IP address:
62
35
63
-
<pre>ifconfig</pre>
36
+
`ifconfig`
64
37
65
-
Please note the IP address of your Ethernet adapter.
38
+
==**Please note the IP address of Y-O-U-R Ethernet adapter.**==
66
39
67
40

68
41
69
-
Please note that my adapter is called `eth0` and my IP address is `10.10.1.117` Your IP Address and adapter name may be different.
70
-
71
-
Remember this IP by writing it down, etc.
42
+
Please note that my adapter is called **"eth0"** and my IP address is **"10.10.1.117"** Your IP Address and adapter name may be different.
72
43
73
44
First, we need to run the following command in order to mount our remote system to the correct directory:
This command focuses on the closed connections (FIN) and pull just specific fields out of the data to clean it up. We use cut with the -d switch to specify the delimiter, which is a space. Then, we tell it what fields, or columns of the output, we are interested in.
48
+
This command focuses on the closed connections **(FIN)** and pull just specific fields out of the data to clean it up. We use cut with the **"-d"** switch to specify the delimiter, which is a space. Then, we tell it what fields, or columns of the output, we are interested in.
49
49
50
50
When put together, our output looks something like this:
51
51
@@ -58,30 +58,32 @@ If you look at our previous output, you may notice that outside connections are
58
58
59
59
So why don't we look at just the connections made to `13.107.237.38` by running the following command:
From the command prompt we need to get the IP address of your **Windows** system:
15
15
16
16
If you are having trouble with Windows Terminal, you can simply start each of the three shells, we use by starting them directly from the Windows Start button.
17
17
@@ -53,7 +53,7 @@ Alternatively, you can click on the Kali logo in the taskbar.
53
53
54
54

55
55
56
-
Next, let’s become root:
56
+
Let’s become root:
57
57
58
58
<pre>sudo su -</pre>
59
59
@@ -69,12 +69,11 @@ It should look like this:
69
69
70
70
Please note the open ports. These are ports and services that an attacker could use to authenticate to your system. Or, attack if an exploit is available.
71
71
72
-
73
-
Now, let’s go back to the Windows command prompt, by clicking the icon in the taskbar.
72
+
Let’s go back to the Windows command prompt, by selecting the Administrator: Command Prompt tab.
0 commit comments