Explore the evolution of Windows malware and learn advanced techniques for detecting and analyzing suspicious PowerShell activity in this conference talk from Derbycon 7. Dive into the features of DeepBlueCLI v2, now available in both PowerShell and Python, and discover how to leverage this tool for enhanced security analysis. Gain insights into manual gzip advantages, regex implementation, and automatic detective whitelisting. Examine real-world examples of malware techniques, including hidden PowerShell windows and binary encoding. Understand the challenges of malware detection and the importance of continuous improvement in cybersecurity tools. Learn about integrating with Security Onion and extracting valuable information from event logs. Perfect your skills in identifying and mitigating sophisticated PowerShell-based attacks through practical demonstrations and expert guidance.
Introducing DeepBlueCLI v2 Now Available in PowerShell and Python