Completed
Perfect attacker fallacy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Introducing DeepBlueCLI - A PowerShell Module for Hunt Teaming via Windows Event Logs
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 The evolution of payloads
- 3 What does my average client have
- 4 What do you look for
- 5 Logging new process creation
- 6 Writing the script
- 7 Design notes
- 8 Perfect solution fallacy
- 9 Perfect attacker fallacy
- 10 Regex
- 11 Whitelist
- 12 Use cases
- 13 Summary
- 14 DeepBlueCLI
- 15 Metasploit
- 16 Hash Dump
- 17 Defaults
- 18 Modern
- 19 System
- 20 Power
- 21 NetWeb
- 22 PowerShell
- 23 DeepBlue CLI
- 24 Invoke obfuscation
- 25 Stock Total Shoutout
- 26 Detected
- 27 Next Steps
- 28 Demo