|
You are here |
www.syspanda.com | ||
| | | | |
blog.virustotal.com
|
|
| | | | | Kaspersky's CTI analysts recently released their Asian APT groups report, including details on behavior by different adversaries. Followin... | |
| | | | |
www.darkoperator.com
|
|
| | | | | [AI summary] The provided text discusses various methods to secure PowerShell environments against potential threats, focusing on monitoring, logging, and policy enforcement. It outlines the use of Group Policy to enable module logging, which helps track PowerShell cmdlet activities. The text also covers the use of Software Restriction Policies (SRP) and AppLocker for controlling application execution. Additionally, it mentions the PowerShell v3 feature __PSLockdownPolicy as a tool for restricting PowerShell functionalities. The author emphasizes the importance of planning and testing these security measures in a controlled environment to ensure effectiveness. | |
| | | | |
www.wietzebeukema.nl
|
|
| | | | | By manipulating environment variables on process level, it is possible to let trusted applications load arbitrary DLLs and execute malicious code. This post lists nearly 100 executables vulnerable to this type of DLL Hijacking on Windows 11 (21H2); it is demonstrated how this can achieved with just three lines of VBScript. | |
| | | | |
jdhitsolutions.com
|
|
| | | A collection of PowerShell tips, tricks, advice and one-line commands. Includes material for both Windows PowerShell and PowerShell Core. | ||