π‘οΈSecurity Controls Enumeration
π Overview
π― Why Enumerate Security Controls?
π Strategic Planning
β οΈ Common Variations
π‘οΈ Windows Defender Enumeration
π Overview
π Checking Defender Status
π Example Output Analysis
π― Critical Parameters Interpretation
π§ Additional Defender Checks
π AppLocker Enumeration
π Overview
π Enumerating AppLocker Policies
π Example AppLocker Policy Analysis
π― AppLocker Bypass Strategies
πͺ Common PowerShell Bypass Locations
π Writable Directory Identification
π§ AppLocker Analysis Script
π PowerShell Constrained Language Mode
π Overview
π Checking Language Mode
π Language Mode Impact Analysis
π― Constrained Language Mode Detection
π§ Testing Specific Restrictions
π LAPS (Local Administrator Password Solution)
π Overview
π οΈ LAPS Enumeration Tools
π Finding LAPS Delegated Groups
π― LAPS Extended Rights Enumeration
π Retrieving LAPS Passwords
π§ Manual LAPS Enumeration (Without LAPSToolkit)
π― LAPS Attack Strategies
π Targeting LAPS Admins
πͺ Computer Account Hijacking
π§ Additional Security Controls
π‘οΈ Windows Firewall
π΅οΈ Event Log Monitoring
π BitLocker
π Complete Security Controls Assessment Script
π Comprehensive Enumeration Script
π― Key Attack Implications
π Security Control Impact Matrix
π Adaptation Strategies
π‘οΈ High Security Environment
π§ Medium Security Environment
π― Low Security Environment
β‘ Quick Reference Commands
π Rapid Assessment
π οΈ Bypass Testing
π Key Takeaways
β
Essential Enumeration Points
β οΈ Critical Considerations
π― Strategic Planning
Last updated