Главная
Study mode:
on
1
Intro
2
whoarewe
3
Our Prediction...
4
Why Use Sysinternals?
5
PsTools Disclaimer
6
Internal Recon PsInfo
7
Internal Recon PsLoggedOn
8
Internal Recon Logon Sessions
9
Internal Recon AdExplorer
10
Internal Recon ShareEnum
11
Internal Recon TCPView
12
Execution PsExec
13
Execution BgInfo
14
Persistence PsPasswd
15
Persistence MoveFile
16
Anti-Forensics MoveFile
17
Detecting Sysinternals Registry
18
Detecting Sysinternals ShimCache
19
Detecting Sysinternals Sdelete
Description:
Explore the potential misuse of Sysinternals tools for malicious purposes in this NolaCon 2017 conference talk. Delve into various internal reconnaissance techniques using PsInfo, PsLoggedOn, AdExplorer, ShareEnum, and TCPView. Learn about execution methods with PsExec and BgInfo, as well as persistence mechanisms utilizing PsPasswd and MoveFile. Discover anti-forensics techniques and methods for detecting Sysinternals usage through registry analysis, ShimCache examination, and Sdelete identification. Gain valuable insights into how attackers might leverage these powerful system utilities and how to defend against such tactics.

Skynet Will Use PsExec When SysInternals Go Bad

Add to list
00:00
-01:15