- Apr 21, 2014
- 179
Many people on "malwaretips.com" have said why do you need to know about exploits? Well this is very simple, I have ran into more information on the internet that "Python" exploits are more used. There are loads of exploits on newer Operating Systems now including in Metasploits! When your AV's fails to detect Malware, customers will need to know more about the next layer of security needed to secure there PC's. This got me also thinking about, should I still use UAC Mode or Applocker knowing what application that should be allowed or not? I have other ways not to get any UAC Popups on the users UAC Screen!
You can use any Remote Terminal and Execute these commands remotely for Applocker Security without DC's Domain Controllers, just using any small Networks using either Ncat or Telnet maybe your own Computer Backdoor without user authentication. First open a command prompt or Shell and type the following inputs! But anybody with the basic starter Windows version will not get the extra security such as Applocker!
Code:
1. Powershell
2. Import-Module Applocker
3. Get-Command *Applocker*
4. Get-AppLockerFileInformation –EventLog –EventType Denied –Statistics
5. Get-AppLockerFileInformation -Path "" | New-AppLockerPolicy -Optimize | Set-AppLockerPolicy -Merge
Make sure you use the merge in the command overwise you will lock yourself out of your own Computer System!
You will need to run the program "gpedit" and find Applocker Security Options, you can also check if the commands have worked or not?
Last edited: