Главная
Study mode:
on
1
Intro
2
Speaker Background
3
What is Hunt?
4
Hunt vs DFIR (tdr it's sort of the same, but not)
5
The Hunter's Tool Bag (Examples)
6
A Tale of Two Hunting Methodologies
7
PSHunt Components/Modules
8
Scanners
9
Survey Deployment
10
Execution Methods
11
Discovery / Testing Access
12
Persistence Mechanisms (Autostarts)
13
Memory-resident Malware Analysis
14
Survey Analysis Modules Initialize-ReputationData
15
Active Processes/Modules/Drivers
16
Digital Signatures?
17
Process Memory Injection
18
PSHunt-Powershell Threat Hunting
Description:
Explore advanced endpoint hunting techniques using PowerShell in this 28-minute conference talk from BSidesLV 2016. Delve into the world of threat hunting as Chris Gerritz breaks down the differences between hunting and DFIR, introduces essential tools for hunters, and presents two distinct hunting methodologies. Learn about PSHunt components and modules, including scanners, survey deployment, and execution methods. Discover techniques for testing access, analyzing persistence mechanisms, and detecting memory-resident malware. Gain insights into survey analysis modules, process memory injection, and the initialization of reputation data. Master the art of PowerShell-based threat hunting to enhance your cybersecurity skills and protect endpoints effectively.

Powershell-Fu - Hunting on the Endpoint

BSidesLV
Add to list
0:00 / 0:00