Invoke Obfuscation: Powershell Obfuscation Techniques n How To Try To Detect Them
he very best attackers hide their commands from A/V and application whitelisting technologies using encoded commands and memory-only payloads to evade detection. These techniques thwart Blue Teams from determining what was executed on a target system. However, network defenders are catching on, and state-of-the-art detection tools now monitor the command line arguments for powershell.exe either in real-time or from event logs.
This talk will highlight a dozen never-before-seen techniques for …