Analyzing PowerShell Payloads - Part 4

preview_player
Показать описание
Example 4: Obfuscated PowerShell payload and 64 bit shellcode analysis

Global Start
Start:

$Id = Get-Process example4 | Select Id ; Get-NetTCPConnection -OwningProcess $Id.Id

--

John Dwyer

--

Disclaimer: Samples shown in the video were pulled from open source intel locations and we don't recommend accessing the associated IPs or domains.
Рекомендации по теме