Hunting PowerShell Command Lines

By Chad Tilbury on July 19, 2014 in Incident Response, Memory Forensics — 1 Comment

My recent webcast with Jaron Bradley was recorded and a link is available below.  If you have been looking for an excuse to get more familiar with Windows PowerShell, have a look.

What Malware?  Hunting Command Line Activity

There is a reason hackers use the command line, and it isn’t to impress you with their prowess. Throughout the history of Windows, the command line has left far fewer forensic artifacts than equivalent operations via the GUI. To make matters worse, the transition to Windows 7 and 8 has spread PowerShell throughout the enterprise. While it makes our lives easier as defenders, it does the same for our adversaries. Every time you marvel at the capabilities of PowerShell, you should fear how your adversaries may use that power against you.

In this CrowdCast we have collected tips and tricks from our incident responders describing how they are countering the command line threat. Learn to identify when it is in play, extract commands from memory and network packets, and see what is new on the horizon from Microsoft to make tracking command line activity easier.

One response to Hunting PowerShell Command Lines

  1. Hi Chad! Hope you are fine! Nice job with CLI analysis. Thanks.. Regards, Luis Dias

Leave a Reply