Hunting for Malicious PowerShell using Script Block Logging

Hunting for Malicious PowerShell using Script Block Logging

Splunk Threat Research: Hunting for Malicious PowershellПодробнее

Splunk Threat Research: Hunting for Malicious Powershell

Using osquery & MITRE ATT&CK to Provide Analytics for Incident Response and Threat HuntingПодробнее

Using osquery & MITRE ATT&CK to Provide Analytics for Incident Response and Threat Hunting

Splunk .Conf 2016 - Powershell Power Hell: Hunting for Malicious use of PowershellПодробнее

Splunk .Conf 2016 - Powershell Power Hell: Hunting for Malicious use of Powershell

ShowMeCon 2018 Track 3 04 PowerShell exploitation PowerSploit Bloodhound PowerShellMafia ObfuscationПодробнее

ShowMeCon 2018 Track 3 04 PowerShell exploitation PowerSploit Bloodhound PowerShellMafia Obfuscation

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean MetcalfПодробнее

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

BSides DC 2016 - PowerShell Security: Defending the Enterprise from the Latest Attack PlatformПодробнее

BSides DC 2016 - PowerShell Security: Defending the Enterprise from the Latest Attack Platform

211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric ConradПодробнее

211 Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs Eric Conrad

События