Главная
Study mode:
on
1
Introduction
2
The evolution of payloads
3
What does my average client have
4
What do you look for
5
Logging new process creation
6
Writing the script
7
Design notes
8
Perfect solution fallacy
9
Perfect attacker fallacy
10
Regex
11
Whitelist
12
Use cases
13
Summary
14
DeepBlueCLI
15
Metasploit
16
Hash Dump
17
Defaults
18
Modern
19
System
20
Power
21
NetWeb
22
PowerShell
23
DeepBlue CLI
24
Invoke obfuscation
25
Stock Total Shoutout
26
Detected
27
Next Steps
28
Demo
Description:
Explore DeepBlueCLI, a PowerShell module designed for hunt teaming through Windows event logs, in this 49-minute conference talk from Derbycon 2016. Delve into the evolution of payloads, common client environments, and key indicators to monitor. Learn about logging new process creation, script writing techniques, and important design considerations. Examine use cases for DeepBlueCLI, including its application with Metasploit, hash dumping, and modern system attacks. Discover how to detect obfuscation attempts and gain insights on next steps for implementation. Conclude with a practical demonstration of DeepBlueCLI's capabilities in enhancing Windows event log analysis for improved threat detection and response.

Introducing DeepBlueCLI - A PowerShell Module for Hunt Teaming via Windows Event Logs

Add to list
0:00 / 0:00