Overview
Syllabus
Intro
Motivations for "Living off the Land"
Case for PS Remoting (WinRM)
PowerShell Remoting
WMI-based Data Collection
CimSweep - Introduction
Intrusion Detection
WMI Event Basics - Events
WMI Query Language via PowerShell
Uproot - Introduction
ETW Introduction
ETW Terminology
Common ETW Usage
ETW for Incident Response
ETW Capture Scenario
Investigation
PowerForensics - Introduction
Taking Ideas from the Bad Guys
Device Guard - Introduction
Device Guard vs. AppLocker
Device Guard Monitoring
Device Guard Bypass Strategies
Device Guard Bypass Mitigations