You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You have listed Execute and Download as categories.
This is also a AWL (Applocker) Bypass.
Since winget.exe is auto elevating and install packages under ProgramFiles/WindowsApps, this bypasses a Deny rule on executables in Applocker.
The default rule allows programs to run under the ProgramFiles folder(where winget put it's packages).
Poc:
Set up a Deny Policy on a sysinternal executable in Applocker
Open cmd as a standard user and use winget with the following command, to download and install sysinternals: winget install 9P7KNL5RWT25
Navigate to the tools folder of WindowsApps sysinternals: C:\Program Files\WindowsApps\Microsoft.SysinternalsSuite_2024.12.0.0_x64__8wekyb3d8bbwe\tools
Execute the .exe of one of the sysinternals that has a deny rule in Applocker
ALSO the --location switch (if supported) or -i in winget - can potentially install programs and executables in other whitelisted folders in Applocker.
Let me know what you think!
The text was updated successfully, but these errors were encountered:
Hello.
A addition to winget.exe (https://lolbas-project.github.io/lolbas/Binaries/Winget/)
You have listed Execute and Download as categories.
This is also a AWL (Applocker) Bypass.
Since winget.exe is auto elevating and install packages under ProgramFiles/WindowsApps, this bypasses a Deny rule on executables in Applocker.
The default rule allows programs to run under the ProgramFiles folder(where winget put it's packages).
Poc:
Video PoC:
https://www.youtube.com/watch?v=zuL7x4Wltto
ALSO the --location switch (if supported) or -i in winget - can potentially install programs and executables in other whitelisted folders in Applocker.
Let me know what you think!
The text was updated successfully, but these errors were encountered: