Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hijacking .NET to Defend PowerShell

Security BSides San Francisco via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore defensive strategies against PowerShell attacks in this 32-minute conference talk from BSidesSF 2017. Delve into the mind of a hacker to understand effective defense mechanisms. Begin with a brief introduction to .NET and PowerShell before diving deep into various attacker techniques from a blue team perspective. Learn about assembly modification, class and method injection, compiler profiling, and C-based function hooking. Discover how to utilize stealthy runtime .NET hijacking techniques for PowerShell attack prevention and monitoring. Examine the limitations of Microsoft's AMSI solution for PowerShell v5 and explore alternative approaches. Gain insights into phishing campaigns, malware obfuscation, offensive frameworks, and the foundations of .NET, including Common Language Runtime (CLR) and Just-in-Time Compiler (JIT). Compare solution results and take away valuable knowledge to enhance your cybersecurity defenses against PowerShell-based threats.

Syllabus

Intro
GOALS
CONTENT OVERVIEW FOUNDATIONS
TIMELINE
PHISHING CAMPAIGNS
BAD MALWARE PICKUP LINES
OBFUSCATION
OFFENSIVE FRAMEWORKS
FOUNDATIONS of .NET
COMMON LANGUAGE RUNTIME (CLR)
JUST-IN-TIME COMPILER (JIT) METADATA LOOKUPS
STRONG NAMED ASSEMBLIES
NGEN ASSEMBLIES
POWERSHELL
AMSI BYPASSES
C# DLL INJECTION
NET ROOTKITS BINARY MODIFICATION
CLR PROFILING
SETTING IL HOOK
JIT COMPILER HOOKING
C-BASED METHOD HOOKING
SOLUTION RESULTS COMPARISON
TAKE AWAYS

Taught by

Security BSides San Francisco

Reviews

Start your review of Hijacking .NET to Defend PowerShell

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.