A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


A survey of Powershell enabled malware - Tyler Halfpop Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

A survey of Powershell enabled malware
Tyler Halfpop
Derbycon 2015

Powershell has extremely powerful capabilities and is built-in to modern versions of Windows. Penetration testers and red teams have been using Powershell to pillage networks for years now, but it is not often talked about how malware authors are abusing Powershell in real attacks. This talk examines several cases of Powershell malware seen in the wild and looks at what we can expect in the future. Recommendations will also be given on how to defend against Powershell attacks.

Tyler is a threat researcher for Fidelis Cybersecurity. Tyler's main research interests are in reverse engineering and malware analysis. He is currently working on his doctorate in computer science. He is a SANS Lethal Forensicator and has several industry certifications including the CISSP and GREM. He likes to stay involved in the security community through several organizations and has spoken at various conferences and meetings.

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast