Incident Response Training, Decoding Powershell- Day 18

preview_player
Показать описание
In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-18 and we are going to explore the easiest way to read, understand, analyze, decode malicious PowerShell scripts through practical demonstration. Malicious PowerShell scripts are becoming the tool of choice for attackers. Although sometimes referred to as “fileless malware”, they can leave behind forensic artifacts for examiners to find. In this episode, learn how to locate and identify activity of these malicious PowerShell scripts. Once located, these PowerShell scripts may contain several layers of obfuscation that need to be decoded. I will walk through how to decode them, as well as some light malware analysis on any embedded shellcode. I will also demonstrate how to use some freely available tools to easily automate the process once you have discovered the MO of the attacker in your case.
First we will go through some theatrical part which any incident responder need to understand about PowerShell, why they are used and some of the basic conventions, afterwards we will show 3 samples of heavily obfuscated PowerShell and how can we decode them to identify the basics and thus take required actions.

🔗LINKs for your requirements-
-------------------------------------------------------------------------------------------------------------------------

WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------


Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Introduction
1:18 ⏩ Why Powershell
5:03 ⏩ PowerShell LoL example
8:00 ⏩ How to find it from Logs
18:14 ⏩ Sample1 Analysis
23:21 ⏩ Sample2 Analysis
33:28 ⏩ Sample3 Analysis
38:51 ⏩ Summarize

📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ Twitter: @blackperl_dfir

SUPPORT BLACKPERL
-------------------------------------------------------------------------------------------------------------------------
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment

-------------------------------------------------------------------------------------------------------------------------
🙏 Thanks for watching!! Be CyberAware!! 🤞
Рекомендации по теме
Комментарии
Автор

In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-18 and we are going to explore the easiest way to read, understand, analyze, decode malicious PowerShell scripts through practical demonstration. Malicious PowerShell scripts are becoming the tool of choice for attackers. Although sometimes referred to as “fileless malware”, they can leave behind forensic artifacts for examiners to find. In this episode, learn how to locate and identify activity of these malicious PowerShell scripts. Once located, these PowerShell scripts may contain several layers of obfuscation that need to be decoded. I will walk through how to decode them, as well as some light malware analysis on any embedded shellcode. I will also demonstrate how to use some freely available tools to easily automate the process once you have discovered the MO of the attacker in your case.
First we will go through some theatrical part which any incident responder need to understand about PowerShell, why they are used and some of the basic conventions, afterwards we will show 3 samples of heavily obfuscated PowerShell and how can we decode them to identify the basics and thus take required actions.

🔗LINKs for your requirements-



WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!



Timelines

0:00 ⏩ Introduction
1:18 ⏩ Why Powershell
5:03 ⏩ PowerShell LoL example
8:00 ⏩ How to find it from Logs
18:14 ⏩ Sample1 Analysis
23:21 ⏩ Sample2 Analysis
33:28 ⏩ Sample3 Analysis
38:51 ⏩ Summarize

📞📲
FOLLOW ME EVERYWHERE-

✔ Twitter: @blackperl_dfir

SUPPORT BLACKPERL

╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡ SUBSCRIBE, Share, Like, Comment


🙏 Thanks for watching!! Be CyberAware!! 🤞

BlackPerl
Автор

You are a great teacher. The way you explain the topics is clear and understandable. Hoping you can come up with more of this type of videos.

KA-NV
Автор

You rock! Thanks for putting this series together...

conanbradley
Автор

Love this Incident Response Training series. Thanks for these videos.

anurodhacharya
Автор

To the point !! Thanks a Ton for doing this. I have learnt many new things :)

abhinavsheel
Автор

This is excellent. Thanks for making the series

josephford
Автор

Thank you for video, video is very great. I have a question. My question is how can dowloand sample code?

servermadum
Автор

I loved your way of explanation. I didn't miss any lectures on your channel. Please share the samples with me.

saichandtadepalli
Автор

Thanks for the content. My query is how can we find whether it is encoded with Base64 or other algorithm.

varunsankar
Автор

As feedback: It would be better if you would provide samples to us to get hands-on experience. 🤞🤞

yashgoldsmith
Автор

Can you Please show how you get the decimal values from the sample loaded at the end in ghidra ?

sagibersodsky
Автор

Thanks a lot man .This is what i was looking for . Could you please share these samples ?

subhampareek