Black Hat USA 2017

Lee Holmes, Daniel Bohannon

PowerShell Obfuscation Detection/Evasion Using Science

Jul 2017
play

Attackers, administrators and many legitimate products rely on PowerShell for their core functionality. However, being a Windows-signed binary native on Windows 7 and later that enables reflective injection of binaries and DLLs and memory-resident execution of remotely hosted scripts, has made it increasingly attractive for attackers and commodity malware authors alike. In environments where PowerShell is heavily used, filtering out legitimate activity to detect malicious PowerShell usage is not trivial.

Discuss

0 comment