Completed
Script Blocks are labeled
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
PowerShell Exploitation - PowerSploit - Bloodhound - PowerShellMafia - Obfuscation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 PowerShell Exploitation
- 3 What is set? What version?
- 4 Audit with LOG-MD
- 5 PS Event IDs - Windows PowerShell
- 6 PS Event IDs - PowerShell/Operational
- 7 What is Malware Using?
- 8 Exploit Kits
- 9 Typical Malware launching PowerShell
- 10 Did that look normal?
- 11 They do this to hide what you see
- 12 PowerShell Logs show it too
- 13 Base64 Encoded
- 14 Manual Translation
- 15 PS Base 64 blob
- 16 4104 Decodes Base64 blobs
- 17 Obfuscation - Odd stuff - 4688
- 18 Script Blocks are labeled
- 19 This is a normal Script Block
- 20 WARNING !!!!
- 21 4100 - Executing Pipeline
- 22 PS v2 - 500 Events
- 23 Filtering out the good, to find the bad
- 24 Code your PowerShell for exclusion
- 25 Create Email Alerts
- 26 PowerShell Log Goodness
- 27 Security Log
- 28 PowerShell v5
- 29 How do I hunt for PS?
- 30 Summary
- 31 Resources
- 32 Questions?