Blog

PowerShell

PowerShell Obfuscation: Stealth Through Confusion, Part I

Michael Buckbee

Michael Buckbee

To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat...

How to use PowerShell Objects and Data Piping

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

Windows PowerShell vs. CMD: What's The Difference?

Michael Buckbee

Michael Buckbee

PowerShell is Microsoft’s updated shell that replaced the previous command prompt (CMD). Learn how to take advantage of cmdlets, piping, and third-party extensions.

Windows PowerShell Scripting Tutorial For Beginners

Michael Buckbee

Michael Buckbee

New to PowerShell scripting? Explore these scripting tutorials to learn to write and execute basic scripts, PowerShell cmdlets, aliases, pipes and more.

PowerShell Array Guide: How to Use and Create

Michael Buckbee

Michael Buckbee

Learn how to best use PowerShell arrays — we'll cover the basics of how to create them, work with them as well as some more advanced techniques.

PowerShell Obfuscation: Stealth Through Confusion, Part II

Michael Buckbee

Michael Buckbee

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse...

How To Use PowerShell for Privilege Escalation with Local Computer Accounts

Michael Buckbee

Michael Buckbee

Privilege escalation is when an attacker is able to exploit the current rights of an account to gain additional, unexpected access. While this can be caused by zero-day vulnerabilities, state-level...

What is Endpoint Security? A Complete Guide

Michael Buckbee

Michael Buckbee

Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.

Practical PowerShell for IT Security, Part V: Security Scripting Platform Gets a Makeover

Michael Buckbee

Michael Buckbee

A few months ago, I began a mission to prove that PowerShell can be used as a security monitoring tool. I left off with this post, which had PowerShell code...

Disabling PowerShell and Other Malware Nuisances, Part III

Michael Buckbee

Michael Buckbee

One of the advantages of AppLocker over Software Restriction Policies is that it can selectively enable PowerShell for Active Directory groups. I showed how this can be done in the...

Disabling PowerShell and Other Malware Nuisances, Part II

Michael Buckbee

Michael Buckbee

Whitelisting apps is nobody’s idea of fun. You need to start with a blank slate, and then carefully add back apps you know to be essential and non-threatening. That’s the...

How to use PowerShell for WannaCry / WannaCrypt cleanup and prevention

Michael Buckbee

Michael Buckbee

Use PowerShell to help test and resolve issues from WannaCry / WannaCrypt variants and other ransomware attacks.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.