| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Powershell has extremely powerful capabilities and is built-in to modern versions of Windows. Penetration testers and red teams have been using Powershell to pillage networks for years now, but it is not often talked about how malware authors are abusing Powershell in real attacks. This talk examines several cases of Powershell malware seen in the wild and looks at what we can expect in the future. Recommendations will also be given on how to defend against Powershell attacks. Tyler is a threat researcher for Fidelis Cybersecurity. Tyler's main research interests are in reverse engineering and malware analysis. He is currently working on his doctorate in computer science. He is a SANS Lethal Forensicator and has several industry certifications including the CISSP and GREM. He likes to stay involved in the security community through several organizations and has spoken at various conferences and meetings.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast