The Detection Series: PowerShell
Featuring
About This Webinar
Installed on nearly every Windows operating system in the world, PowerShell is a versatile tool for automation and remote system management that’s beloved by administrators and adversaries alike. It allows adversaries to execute commands, obfuscate malicious activity, download arbitrary binaries, gather information, change system configurations, and much more—all while blending in with routine operating system activity.
Attendees will leave with a better understanding of what PowerShell is and how adversaries leverage it. More importantly, practitioners will know where to find malicious activity, how to develop detection analytics for it, and how to test their detection and visibility capabilities.
-
Host David Davis Author, Speaker, and vExpert ActualTech Media
-
Featuring Matt Graeber Director, Threat Research Red Canary
-
Featuring Sarah Lewis Senior Detection Engineer Red Canary
-
Featuring Jamie Williams Principal Adversary Emulation Engineer MITRE ATT&CK
-
Featuring Casey Parman Manager & Lead, Threat Analysis Unit VMware
What You'll Learn
- Common ways that adversaries abuse PowerShell
- Tools and log sources that collect relevant telemetry
- How to detect, mitigate, and respond to malicious PowerShell activity
- Strategies for testing your security controls by executing suspicious PowerShell commands with Atomic Red Team