menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Malware News

>

Leveraging...
source image

Medium

1M

read

0

img
dot

Image Credit: Medium

Leveraging PowerShell for Code Execution

  • PowerShell can be used to enumerate and exploit a target in many ways, hence techniques to evade and abuse it exist
  • This article delves into a Huntress blog post and analyzes PowerShell code implementation intricacies and low-level nuances
  • Using a PowerShell v1 target environment helps script execution bypass AMSI and hastens the exploitation process
  • The above code snippets shows how to target a registry key and execute the code with Invoke-Expression
  • Code-wise, PowerShell script has benefits over C code in things like location of libraries is handled by the system
  • System.dll and UnsafeNativeMethods class are used in PowerShell script to link .NET code with unmanaged windows APIs
  • Delegate type function plays a vital role in invocation of API functions by malicious actors
  • User-mode malware typically involves allocation of memory and passing shellcode in that memory space to execute concurrently
  • Conditional logic is added to the code for avoiding newer 64-bit versions of PowerShell with AMSI incorporated
  • The article describes the understanding gained from the observation of the TTPs used by threat actors in a PowerShell script

Read Full Article

like

Like

For uninterrupted reading, download the app