Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion

Step into the lab, and let's watch a video together and try and learn something new.

Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. While this provides tremendous value for most of today’s Power Shell attacks, I will introduce over a dozen obfuscation techniques that render today’s detection techniques grossly ineffective.

These techniques will enable the innovative Red Team to continue using Power Shell undetected while challenging the Blue Team to identify these attacks more effectively. Finally, I will unveil Invoke-Obfuscation.ps1 which will enable both Red and Blue Teams to effortlessly create highly obfuscated PowerShell commands so organizations can test their detection capabilities against these obfuscation techniques.

 

Leave a Reply

Your email address will not be published. Required fields are marked *