Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Diaries by Keyword Diaries by Keyword

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

POWERSHELL ISE

2020-09-24Xavier MertensParty in Ibiza with PowerShell

POWERSHELL

2021-05-28/a>Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-18/a>Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-04-08/a>Xavier MertensSimple Powershell Ransomware Creating a 7Z Archive of your Files
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-01-21/a>Xavier MertensPowershell Dropping a REvil Ransomware
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2020-12-24/a>Xavier MertensMalicious Word Document Delivering an Octopus Backdoor
2020-11-30/a>Didier StevensDecrypting PowerShell Payloads (video)
2020-11-25/a>Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-23/a>Xavier MertensMalicious Word Document with Dynamic Content
2020-09-11/a>Rob VandenBrinkWhat's in Your Clipboard? Pillaging and Protecting the Clipboard
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-06/a>Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-08-03/a>Xavier MertensPowershell Bot with Multiple C2 Protocols
2020-06-12/a>Xavier MertensMalicious Excel Delivering Fileless Payload
2020-05-15/a>Rob VandenBrinkHashes in PowerShell
2020-05-15/a>Rob VandenBrinkSHA3 Hashes (on Windows) - Where Art Thou?
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-24/a>Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-17/a>Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-10/a>Xavier MertensPowerShell Sample Extracting Payload From SSL
2020-02-28/a>Xavier MertensShow me Your Clipboard Data!
2020-01-23/a>Xavier MertensComplex Obfuscation VS Simple Trick
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-09/a>Didier Stevens(Lazy) Sunday Maldoc Analysis
2019-09-30/a>Didier StevensMaldoc, PowerShell & BITS
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-09-06/a>Xavier MertensPowerShell Script with a builtin DLL
2019-07-28/a>Didier StevensVideo: Analyzing Compressed PowerShell Scripts
2019-07-11/a>Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-10/a>Rob VandenBrinkDumping File Contents in Hex (in PowerShell)
2019-06-28/a>Rob VandenBrinkVerifying Running Processes against VirusTotal - Domain-Wide
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-21/a>Rob VandenBrinkNetstat Local and Remote -new and improved, now with more PowerShell!
2019-06-03/a>Didier StevensTip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
2019-05-28/a>Didier StevensOffice Document & BASE64? PowerShell!
2019-04-25/a>Rob VandenBrinkService Accounts Redux - Collecting Service Accounts with PowerShell
2019-04-24/a>Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-03-30/a>Didier Stevens"404" is not Malware
2019-03-20/a>Rob VandenBrinkUsing AD to find hosts that aren't in AD - fun with the [IPAddress] construct!
2019-03-10/a>Didier StevensMalicious HTA Analysis by a Reader
2019-03-10/a>Didier StevensQuick and Dirty Malicious HTA Analysis
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-21/a>Xavier MertensSimple Powershell Keyloggers are Back
2019-02-17/a>Didier StevensVideo: Finding Property Values in Office Documents
2019-02-16/a>Didier StevensFinding Property Values in Office Documents
2019-02-10/a>Didier StevensVideo: Maldoc Analysis of the Weekend
2019-02-09/a>Didier StevensMaldoc Analysis of the Weekend
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2019-01-02/a>Xavier MertensMalicious Script Leaking Data via FTP
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-15/a>Didier StevensDe-DOSfuscation Example
2018-12-12/a>Didier StevensYet Another DOSfuscation Sample
2018-12-03/a>Didier StevensWord maldoc: yet another place to hide a command
2018-11-22/a>Xavier MertensDivided Payload in Multiple Pasties
2018-11-16/a>Xavier MertensBasic Obfuscation With Permissive Languages
2018-11-06/a>Xavier MertensMalicious Powershell Script Dissection
2018-10-26/a>Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-22/a>Xavier MertensMalicious Powershell using a Decoy Picture
2018-09-30/a>Didier StevensWhen DOSfuscation Helps...
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-07-30/a>Didier StevensMalicious Word documents using DOSfuscation
2018-07-26/a>Xavier MertensWindows Batch File Deobfuscation
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2018-05-19/a>Xavier MertensMalicious Powershell Targeting UK Bank Customers
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-06/a>Guy BruneauScans Attempting to use PowerShell to Download PHP Script
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-10-31/a>Xavier MertensSome Powershell Malicious Code
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-08-23/a>Xavier MertensMalicious script dropping an executable signed by Avast?
2017-08-20/a>Didier StevensIt's Not An Invoice ...
2017-08-01/a>Rob VandenBrinkRooting Out Hosts that Support Older Samba Versions
2017-05-03/a>Bojan ZdrnjaPowershelling with exploits
2017-03-30/a>Xavier MertensDiverting built-in features for the bad
2017-02-17/a>Rob VandenBrinkRTRBK - Router / Switch / Firewall Backups in PowerShell (tool drop)
2016-12-02/a>Rob VandenBrinkProtecting Powershell Credentials (NOT)
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-10-31/a>Russ McReeSEC505 DFIR capture script: snapshot.ps1
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-04-28/a>Rob VandenBrinkDNS and DHCP Recon using Powershell
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-01-26/a>Rob VandenBrinkPentest Time Machine: NMAP + Powershell + whatever tool is next
2016-01-25/a>Rob VandenBrinkAssessing Remote Certificates with Powershell
2016-01-19/a>Rob VandenBrinkPowershell and HTTPS ? It Ain?t All Rainbows And Lollipops! (or is it?)
2016-01-06/a>Russ McReetoolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
2015-12-14/a>Russ McReeAD Security's Unofficial Guide to Mimikatz & Command Reference
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-02/a>Rob VandenBrinkNessus and Powershell is like Chocolate and Peanut Butter!
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-24/a>Rob VandenBrinkThe Powershell Diaries - Finding Problem User Accounts in AD
2014-10-23/a>Russ McReeDigest: 23 OCT 2014
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner

ISE

2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2020-09-15/a>Brad DuncanTraffic Analysis Quiz: Oh No... Another Infection!
2020-08-05/a>Brad DuncanTraffic Analysis Quiz: What's the Malware From This Infection?
2020-01-06/a>Johannes UllrichIncrease in Number of Sources January 3rd and 4th: spoofed
2019-07-18/a>Xavier MertensMalicious PHP Script Back on Stage?
2018-06-22/a>Lorna HutchesonXPS Attachment Used for Phishing
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2015-03-07/a>Guy BruneauShould it be Mandatory to have an Independent Security Audit after a Breach?
2014-07-19/a>Russ McReeKeeping the RATs out: the trap is sprung - Part 3
2014-07-18/a>Russ McReeKeeping the RATs out: **it happens - Part 2
2014-07-16/a>Russ McReeKeeping the RATs out: an exercise in building IOCs - Part 1
2014-03-22/a>Guy BruneauHow the Compromise of a User Account Lead to a Spam Incident
2013-04-15/a>Rob VandenBrinkOops - You Mean That Deleted Server was a Certificate Authority?
2013-01-09/a>Richard PorterThe 80's called - They Want Their Mainframe Back!
2012-05-17/a>Johannes UllrichNew IPv6 Video: IPv6 Router Advertisements https://isc.sans.edu/ipv6videos
2011-09-26/a>Jason LamMySQL.com compromised spreading malware
2011-07-11/a>John BambenekAnother Defense Contractor Hacked in AntiSec Hacktivism Spree
2011-06-19/a>Guy BruneauSega Pass Compromised - 1.29 Million Customers Data Leaked
2011-04-18/a>John BambenekWordpress.com Security Breach
2011-04-02/a>Rick WannerRSA/EMC: Anatomy of a compromise
2011-02-21/a>Adrien de BeaupreWinamp forums compromised
2010-12-13/a>Deborah HaleGawker Media Breach of Security
2010-02-28/a>Mari NicholsDisasters take practice
2010-01-26/a>Jason Lame107 CMS system website compromised
2009-10-05/a>Adrien de BeaupreTime to change your hotmail/gmail/yahoo password
2009-08-28/a>Adrien de Beaupreapache.org compromised
2009-07-29/a>Bojan ZdrnjaIncreasing number of attacks on security sites
2009-07-11/a>Marcus SachsImageshack
2008-11-16/a>Maarten Van HorenbeeckDetection of Trojan control channels
2008-08-25/a>John BambenekThoughts on the Best Western Compromise
2006-12-12/a>Swa FrantzenOffline Microsoft Patching