Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic
Monday, February 13 • 2:50pm - 3:20pm
Hijacking .NET to Defend PowerShell

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.

You need to have the mind of a hacker to know how to defend. With the rise of attacks implementing PowerShell in the recent months, there hasn’t been a solid solution for monitoring or prevention. Currently Microsoft released the AMSI solution for PowerShell v5 however this can also be bypassed. This talk will focus on utilizing various stealthy runtime .NET hijacking techniques implemented for blue teamer defenses for PowerShell attacks. The presentation will start with a light intro into .NET and PowerShell, then a deeper look into various attacker techniques which will be explained in the perspective of the blue teamer. Techniques include assembly modification, class & method injection, compiler profiling, and C based function hooking. 


Speakers
avatar for Amanda Rousseau

Amanda Rousseau

Malware Research Unicorn, Endgame
Amanda absolutely loves malware. She works as a Malware Researcher at Endgame who focuses on attacker technique application to dynamic behavior detection both on Windows and OSX platforms.


Monday February 13, 2017 2:50pm - 3:20pm
BuzzWorks