Главная
Study mode:
on
1
Introduction
2
How to download the talk
3
Whats on my website
4
Oregon Trail Expert
5
PreReq
6
Sunlight is the best disinfectant
7
The evolution of Windows malware
8
File list malware
9
Hidden PowerShell window
10
Manual gzip
11
The advantages of manual gzip
12
DeepBlueCLI v2 update
13
Perfect is the enemy of good
14
New features
15
Regex
16
Giant command lines
17
Perfect attacker fallacy
18
Im gonna fail
19
Lost in the wilderness
20
Peta gets smart
21
PowerShell
22
Event Log View
23
Wmake
24
PowerShell launch
25
Older examples
26
New object output mode
27
Metasploit
28
Pipe
29
PSExec
30
PSAttack
31
Daniel Bohannon
32
Dan Daniel
33
Multiple rounds
34
Alpha count
35
Binary encoding
36
Global variable
37
Object output
38
Automatic detective whitelisting
39
CSV deepwhitelist
40
Automate deepwhitelist
41
Is PowerShellExec evil
42
A revolution happening in Sims Elastic Stack
43
Why Python
44
Security Onion
45
How to get event logs
46
Python EBTX
47
BBBTX
48
Demo
49
Lobby Con
Description:
Explore the evolution of Windows malware and learn advanced techniques for detecting and analyzing suspicious PowerShell activity in this conference talk from Derbycon 7. Dive into the features of DeepBlueCLI v2, now available in both PowerShell and Python, and discover how to leverage this tool for enhanced security analysis. Gain insights into manual gzip advantages, regex implementation, and automatic detective whitelisting. Examine real-world examples of malware techniques, including hidden PowerShell windows and binary encoding. Understand the challenges of malware detection and the importance of continuous improvement in cybersecurity tools. Learn about integrating with Security Onion and extracting valuable information from event logs. Perfect your skills in identifying and mitigating sophisticated PowerShell-based attacks through practical demonstrations and expert guidance.

Introducing DeepBlueCLI v2 Now Available in PowerShell and Python

Add to list
0:00 / 0:00