Главная
Study mode:
on
1
Intro
2
Background Case Study
3
Why PowerShell?
4
PowerShell Attack Tools
5
PowerShell Malware in the Wild
6
Investigation Methodology
7
Attacker Assumptions
8
Version Reference
9
WinRM Process Hierarchy
10
Remnants in Memory
11
How Long Will Evidence Remain?
12
Example - Simple Command
13
Example-Encoded Command
14
What to Look For?
15
Memory Analysis Summary
16
PowerShell Event Logs
17
Local PowerShell Execution
18
Remoting (Accessed Host)
19
PS Analytic Log: Decoded Input
20
PS Analytic Log: Encoded I/O
21
PS Analytic Log: Decoded Output
22
Logging via PowerShell Profiles
23
Logging via AppLocker
24
PowerShell 3.0: Module Logging
25
Module Logging Example: File Listing
26
Module Logging Example: Invoke-Mimikatz
27
PowerShell Persistence
28
Common Techniques
29
Persistence via WMI
30
Event Filters
31
Event Consumers
32
Enumerating WMI Objects with PowerShell
33
PS WMI Evidence: File System
34
PS WMI Evidence: Registry
35
PS WMI Evidence: Other Sources
36
Other Sources of Evidence
37
Lessons Learned
38
Acknowledgements
39
Questions?
Description:
Delve into the world of PowerShell attacks and their forensic investigation in this comprehensive conference talk from BruCON 0x06. Explore how targeted attackers leverage PowerShell for command-and-control operations in compromised Windows environments, focusing on common attack patterns such as lateral movement, remote command execution, reconnaissance, file transfer, and persistence establishment. Learn to collect and interpret forensic artifacts both on individual hosts and across enterprises, with real-world incident examples and recommendations for limiting exposure. Discover investigation methodologies, including memory analysis, event log examination, and WMI object enumeration. Gain insights into PowerShell versions, WinRM process hierarchy, and various logging techniques. Understand attacker assumptions, evidence longevity, and the intricacies of PowerShell persistence mechanisms. Equip yourself with valuable lessons learned and enhance your ability to detect and respond to PowerShell-based threats in your organization's Windows infrastructure. Read more

Investigating PowerShell Attacks

BruCON Security Conference
Add to list
0:00 / 0:00