Investigating PowerShell Attacks

Investigating PowerShell Attacks

BruCON Security Conference via YouTube Direct link

Intro

1 of 39

1 of 39

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Investigating PowerShell Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Background Case Study
  3. 3 Why PowerShell?
  4. 4 PowerShell Attack Tools
  5. 5 PowerShell Malware in the Wild
  6. 6 Investigation Methodology
  7. 7 Attacker Assumptions
  8. 8 Version Reference
  9. 9 WinRM Process Hierarchy
  10. 10 Remnants in Memory
  11. 11 How Long Will Evidence Remain?
  12. 12 Example - Simple Command
  13. 13 Example-Encoded Command
  14. 14 What to Look For?
  15. 15 Memory Analysis Summary
  16. 16 PowerShell Event Logs
  17. 17 Local PowerShell Execution
  18. 18 Remoting (Accessed Host)
  19. 19 PS Analytic Log: Decoded Input
  20. 20 PS Analytic Log: Encoded I/O
  21. 21 PS Analytic Log: Decoded Output
  22. 22 Logging via PowerShell Profiles
  23. 23 Logging via AppLocker
  24. 24 PowerShell 3.0: Module Logging
  25. 25 Module Logging Example: File Listing
  26. 26 Module Logging Example: Invoke-Mimikatz
  27. 27 PowerShell Persistence
  28. 28 Common Techniques
  29. 29 Persistence via WMI
  30. 30 Event Filters
  31. 31 Event Consumers
  32. 32 Enumerating WMI Objects with PowerShell
  33. 33 PS WMI Evidence: File System
  34. 34 PS WMI Evidence: Registry
  35. 35 PS WMI Evidence: Other Sources
  36. 36 Other Sources of Evidence
  37. 37 Lessons Learned
  38. 38 Acknowledgements
  39. 39 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.