Completed
Remoting (Accessed Host)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Investigating PowerShell Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Background Case Study
- 3 Why PowerShell?
- 4 PowerShell Attack Tools
- 5 PowerShell Malware in the Wild
- 6 Investigation Methodology
- 7 Attacker Assumptions
- 8 Version Reference
- 9 WinRM Process Hierarchy
- 10 Remnants in Memory
- 11 How Long Will Evidence Remain?
- 12 Example - Simple Command
- 13 Example-Encoded Command
- 14 What to Look For?
- 15 Memory Analysis Summary
- 16 PowerShell Event Logs
- 17 Local PowerShell Execution
- 18 Remoting (Accessed Host)
- 19 PS Analytic Log: Decoded Input
- 20 PS Analytic Log: Encoded I/O
- 21 PS Analytic Log: Decoded Output
- 22 Logging via PowerShell Profiles
- 23 Logging via AppLocker
- 24 PowerShell 3.0: Module Logging
- 25 Module Logging Example: File Listing
- 26 Module Logging Example: Invoke-Mimikatz
- 27 PowerShell Persistence
- 28 Common Techniques
- 29 Persistence via WMI
- 30 Event Filters
- 31 Event Consumers
- 32 Enumerating WMI Objects with PowerShell
- 33 PS WMI Evidence: File System
- 34 PS WMI Evidence: Registry
- 35 PS WMI Evidence: Other Sources
- 36 Other Sources of Evidence
- 37 Lessons Learned
- 38 Acknowledgements
- 39 Questions?