Demo 17 - Fileless Malware Attack Chain - VBA, WMI, and PowerShell
This video will demonstrate how a typical modern, fileless malware attack chain works. It showcases the power and capabilities of VBA macros, WMI, and PowerShell.
The malware used in this video can be found here: https://drive.google.com/uc?export=download&id=1-amP7Y1fKoFiFk7wN21rU5niRzA-UL2A
Видео Demo 17 - Fileless Malware Attack Chain - VBA, WMI, and PowerShell канала Ben Greenberg
The malware used in this video can be found here: https://drive.google.com/uc?export=download&id=1-amP7Y1fKoFiFk7wN21rU5niRzA-UL2A
Видео Demo 17 - Fileless Malware Attack Chain - VBA, WMI, and PowerShell канала Ben Greenberg
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Fileless Malware Demystified](https://i.ytimg.com/vi/atL1WmmMJJw/default.jpg)
![Running an SQL Injection Attack - Computerphile](https://i.ytimg.com/vi/ciNHn38EyRc/default.jpg)
![Abusing Windows Management Instrumentation (WMI)](https://i.ytimg.com/vi/0SjMgnGwpq8/default.jpg)
![What Is a Fileless Attack?](https://i.ytimg.com/vi/5r40JrrKtlk/default.jpg)
![Watch this hacker break into a company](https://i.ytimg.com/vi/PWVN3Rq4gzw/default.jpg)
![Learn and use PowerShell with just three commands](https://i.ytimg.com/vi/FiTZgpRpWv0/default.jpg)
![8/23/18 Detecting Fileless Malware Attacks | AT&T ThreatTraq](https://i.ytimg.com/vi/60MN_x2lwPc/default.jpg)
![DNS tunneling down the rabbit hole](https://i.ytimg.com/vi/ibRVf3NagBI/default.jpg)
![The ABCs of WMI - Finding Evil in Plain Sight](https://i.ytimg.com/vi/k-_O59BnsHg/default.jpg)
![Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018](https://i.ytimg.com/vi/JWC7fzhvAY8/default.jpg)
![Investigating a Fileless Attack w/ Microsoft Defender ATP & Exploit Protection](https://i.ytimg.com/vi/e3TGejjVyog/default.jpg)
![What is Fileless Malware?](https://i.ytimg.com/vi/5eZRc5eQCwc/default.jpg)
![WMI - Windows Management Instrumentation - [#12] PowerShell for IT Professionals](https://i.ytimg.com/vi/_NadlLhLldY/default.jpg)
![SOC Analyst Skills - 4 "Must Have" Tools for Triaging and Analyzing Malware](https://i.ytimg.com/vi/x0mGxucyZmk/default.jpg)
![Investigating Backdoor Attacks w/ Microsoft Defender ATP](https://i.ytimg.com/vi/SQwVSgdFBFs/default.jpg)
![Testing AntiVirus Detection with Powershell and Excel Macros](https://i.ytimg.com/vi/UoMzCyB2IvE/default.jpg)
![ESET cybersecurity tips & tricks: Fileless malware attacks](https://i.ytimg.com/vi/OCJaK4UnQSg/default.jpg)
![Malware Analysis | Obfuscated PowerShell Dropper (Part 1)](https://i.ytimg.com/vi/gwHBvAqasPc/default.jpg)
![Demo5 - Return-Into-Libc Exploit](https://i.ytimg.com/vi/NCLUm8geskU/default.jpg)
![How To Manage Local Groups & Users For Windows From CMD[Command Prompt]](https://i.ytimg.com/vi/WSTlArxx0J8/default.jpg)