Feb. 8, 2023, 8 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

I recently came across an interesting .NET downloader that displayed odd Powershell activity along with an open directory full of obfuscated files. In this video, we'll investigate this highly obfuscated .net downloader to discuss techniques to unravel it's capabilities. We'll then look at how it redirects STDIN for the Powershell proceess to a stream buffer to avoid leaving evidence in the logs. And finally, we'll unravel the Powershell script used to download and decrypt the open directory full of malicious …

buffer capabilities directory discuss files logs obfuscated powershell powershell script redirects script stream techniques video

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC