Talk With an Expert

PowerShell Security: Is it Enough?

PowerShell Security: Is it Enough? (PDF, 4.09MB)Published: 20 Feb, 2019
Created by
Timothy Hoffman

PowerShell is a core component of any modern Microsoft Windows environment and is used daily by administrators around the world. However, it has also become an attacker's tool of choice when conducting fileless malware attacks (O'Connor, 2017). According to a study by Symantec, the number of prevented PowerShell attacks increased by over 600% between the last half of 2017 and the first half of 2018 (Wueest, 2018). This is a staggering number of prevented attacks, but the more concerning problem is the unknown number of undetected attacks that occurred during this time. Modern attackers often prefer to live off the land, using native tools already in an environment to prevent detection; PowerShell is a prime example of this is. These statistics lead to a suggestion that current PowerShell security may not be effective enough, or organizations are improperly implementing it. This paper investigates the efficiency of PowerShell security, analyzing the success of security features like execution policies, language modes, and Windows Defender, as well as the vulnerabilities introduced by leaving PowerShell 2.0 enabled in an environment. Multiple attack campaigns will be conducted against these security features while implemented individually and collectively to validate their effectiveness in preventing PowerShell from being used maliciously.