June 7, 2023, 8:11 p.m. | Nick Powers

Security Boulevard securityboulevard.com

The contents of this blogpost was written by Nick Powers (@zyn3rgy) and Steven Flores (@0xthirteen), and is a written version of the content presented at Defcon30.


With the barrier to entry for initial access ever increasing, we spent some time digging into potentially lesser-known weaponization options for ClickOnce deployments. A few of the hurdles we’d like to overcome by implementing these weaponization options include:



  • Install / execute application without administrative privileges

  • Reputable, known-good file(s) used …

access clickonce code code execution entry initial access nick options phishing research smartscreen version written

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Security Analysis Senior Specialist

@ NTT DATA | singapore, 01, SG

Information Assurance Analyst - Security Architecture / Vulnerability Management

@ Hawaiian Electric | Honolulu, Hawaii (HI), US, 96840