| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In post-exploitation operations, using native OS capabilities is always preferred over custom tools to minimize attention from security products. As native OS capabilities go, none surpass Microsoft's PowerShell in providing complete access to the Win32 API.Better still, PowerShell allows us to compile code on-the-fly that will get us the functionality we want regardless of system architecture. In this presentation, we will show you several ways to leverage these capabilities to achieve classic hiding behaviors dynamically, and without regard to 32-bit or 64-bit environments, including hiding processes, files and registry entries.
House Version
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast