Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Powershell-Fu - Hunting on the Endpoint

BSidesLV via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced endpoint hunting techniques using PowerShell in this 28-minute conference talk from BSidesLV 2016. Delve into the world of threat hunting as Chris Gerritz breaks down the differences between hunting and DFIR, introduces essential tools for hunters, and presents two distinct hunting methodologies. Learn about PSHunt components and modules, including scanners, survey deployment, and execution methods. Discover techniques for testing access, analyzing persistence mechanisms, and detecting memory-resident malware. Gain insights into survey analysis modules, process memory injection, and the initialization of reputation data. Master the art of PowerShell-based threat hunting to enhance your cybersecurity skills and protect endpoints effectively.

Syllabus

Intro
Speaker Background
What is Hunt?
Hunt vs DFIR (tdr it's sort of the same, but not)
The Hunter's Tool Bag (Examples)
A Tale of Two Hunting Methodologies
PSHunt Components/Modules
Scanners
Survey Deployment
Execution Methods
Discovery / Testing Access
Persistence Mechanisms (Autostarts)
Memory-resident Malware Analysis
Survey Analysis Modules Initialize-ReputationData
Active Processes/Modules/Drivers
Digital Signatures?
Process Memory Injection
PSHunt-Powershell Threat Hunting

Taught by

BSidesLV

Reviews

Start your review of Powershell-Fu - Hunting on the Endpoint

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.