githubEdit

Win11/Server2022 Evasion

Modern Windows security features and bypass techniques for Windows 11 and Server 2022+.

Skill Level: Advanced Prerequisites: Windows internals, memory management, assembly basics

Security Features Overview

Feature
Description
Bypass Difficulty

VBS

Virtualization-Based Security

Hard

HVCI

Hypervisor Code Integrity

Hard

CET

Control-flow Enforcement

Medium-Hard

CFG

Control Flow Guard

Medium

ASR

Attack Surface Reduction

Medium

Credential Guard

Isolated LSASS

Hard

WDAC

Windows Defender App Control

Medium

Smart App Control

AI-based blocking

Medium

Virtualization-Based Security (VBS)

Detection

# Check if VBS is enabled
Get-ComputerInfo | Select-Object -Property DeviceGuard*

# Check via WMI
Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard

# Registry check
reg query "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v EnableVirtualizationBasedSecurity

# msinfo32 output
systeminfo | findstr /i "virtualization"

VBS Components

Bypass Approaches

Hypervisor Code Integrity (HVCI)

Detection

Impact on Attacks

BYOVD (Bring Your Own Vulnerable Driver)

Control-flow Enforcement Technology (CET)

What CET Protects

Detection

Bypass Techniques

Control Flow Guard (CFG)

How CFG Works

Bypass Techniques

Windows Defender Application Control (WDAC)

Detection

Bypass Techniques

Attack Surface Reduction (ASR)

ASR Rules

Bypass Approaches

Credential Guard Bypass

When Enabled

Attack Alternatives

Smart App Control

What It Does

Bypass Approaches

Process Injection (Modern)

Techniques That Still Work

Tools

Detection Evasion Summary

Attack
Pre-Win11
Win11 with VBS

Mimikatz sekurlsa

✗ (Cred Guard)

Kernel driver load

✗ (HVCI)

ROP chains

✗ (CET)

Unsigned code

✗ (WDAC)

BYOVD

Token manipulation

LOLBins

DCSync

Last updated

Was this helpful?