Preparing for PowerShellmageddon - Investigating Windows Command Line Activity
- Chad Tilbury, Senior Instructor, SANS Institute
- Thursday, July 9th, 7:00pm - 8:00pm
There is a reason hackers use the command line, and it isn't to impress you with their prowess. Throughout the history of Windows, the command line has left far fewer forensic artifacts than equivalent operations via the GUI. To make matters worse, the transition to Windows 7 and 8 has spread PowerShell throughout the enterprise. While it makes our lives easier as defenders, it does the same for our adversaries. Every time you marvel at the capabilities of PowerShell, you should fear how your adversaries may use that power against you.
This talk will demonstrate how incident responders are countering the command line threat with real-world examples. Learn to identify when it is in play, extract command history, and see what is new on the horizon from Microsoft to make tracking command line and PowerShell activity easier.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
|Live Broadcast||—||Special Events|
Tuesday, July 7
Wednesday, July 8
Thursday, July 9
|CSI and Blackhat Scorpions: From Hollywood to Keyboard||Robert M. Lee, Instructor, SANS Institute||Thursday, July 9th, 6:00pm - 7:00pm||SANS@Night|
|Preparing for PowerShellmageddon - Investigating Windows Command Line Activity||Chad Tilbury, Senior Instructor, SANS Institute||Thursday, July 9th, 7:00pm - 8:00pm||SANS@Night|