Загрузка страницы

The ABCs of WMI - Finding Evil in Plain Sight

To date, WMI is one of the few forensic topics that hasn't been widely covered on this channel. Let's fix that and explore how we can separate legitimate WMI usage from attacker activity. We'll start with a review and cover the basics of this technology. Then we'll spend the rest of the episode looking at how we can enumerate the contents of the WMI database on a live system and on a dead system.

*** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. ***

📖 Chapters

00:00 - Intro
04:37 - Analyzing WMI with Autoruns for Windows
06:41 - Analyzing WMI with PowerShell
09:48 - Using KAPE to Acquire WMI Artifacts
11:09 - Using PyWMIPersistenceFinder.py
14:16 - Recap

🛠 Resources

Autoruns for Windows:
https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns

KAPE:
https://www.kroll.com/en/insights/publications/cyber/kroll-artifact-parser-extractor-kape

PyWMIPersistenceFinder.py:
https://github.com/davidpany/WMI_Forensics

MITRE ATT&CK - Windows Management Instrumentation:
https://attack.mitre.org/techniques/T1047/

#Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics

Видео The ABCs of WMI - Finding Evil in Plain Sight канала 13Cubed
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
15 февраля 2021 г. 19:22:40
00:15:56
Яндекс.Метрика