Feb. 8, 2023, 8 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

I recently came across an interesting .NET downloader that displayed odd Powershell activity along with an open directory full of obfuscated files. In this video, we'll investigate this highly obfuscated .net downloader to discuss techniques to unravel it's capabilities. We'll then look at how it redirects STDIN for the Powershell proceess to a stream buffer to avoid leaving evidence in the logs. And finally, we'll unravel the Powershell script used to download and decrypt the open directory full of malicious …

buffer capabilities directory discuss files logs obfuscated powershell powershell script redirects script stream techniques video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden