PowerShell doesnt solve the underlying security problem
11
PowerShell is a management engine
12
You block PowerShell
13
Lua scripting language
14
Three stages in security
15
PowerShell security
16
Just enough administration
17
DNS administration
18
Administration
19
Gaea
20
Local Sandboxing
21
Security Exposure
22
PowerShell Security Transparency
23
Configuration
24
Module Pipeline Logging
25
System Transcripting
26
Script Lock Logging
27
Invoke Obfuscation
28
Invoke Expression
29
Antimalware
30
Protected Event Logging
31
Useful PowerShell Events
32
PowerShell Scripts
33
Abstract Syntax Trees
34
Device Guard Application Whitelisting
35
Raid Number
36
Fake Face
Description:
Explore defensive strategies against PowerShell attacks in this 40-minute conference talk from Derbycon 7. Delve into topics such as VBA, Win32 API, post-exploitation frameworks, and the MITRE Framework. Learn why PowerShell is commonly used and examine the challenges of blocking it. Discover PowerShell's role as a management engine and its security features, including Just Enough Administration, local sandboxing, and security transparency. Investigate advanced security measures like configuration module pipeline logging, system transcripting, and script lock logging. Analyze techniques such as Invoke-Obfuscation and Invoke-Expression, and explore antimalware solutions, protected event logging, and useful PowerShell events. Gain insights into PowerShell scripts, abstract syntax trees, and Device Guard application whitelisting to enhance your organization's security posture against PowerShell-based threats.