Application Whitelisting Bypass with WMIC and XSL
Last updated
Last updated
Another application whitelist bypassing technique discovered by Casey @subTee, similar to squiblydoo:
regsvr32Define the XSL file containing the jscript payload:
Invoke any wmic command now and specify /format pointing to the evil.xsl:
Calculator is spawned by svchost.exe: