Past Meetup

Windows Exploitation and Persistence with PowerShell

This Meetup is past

18 people went

The Twisted Hop

616 Ferry Road · Christchurch

How to find us

Grab a beer from the bar then head upstairs.

Location image of event venue

Details

Kim will walk us through a collection of PowerShell delivery (RAM, not disk) techniques for a commonreverse shellcode.

The common payload takes the user supplied shellcode and overwrites the first 0x1000 bytes ofthe calling instance of PowerShell, creates a thread to execute within thevirtual address space of the calling PowerShell instance and starts it.

All delivery and persistence techniques ensure AV bypass of shellcode.

Kim has dissected and will explain how the virus and payload works.

We will look at delivery mediums (virus):
* compiled c executable (teaser: https://youtu.be/a01IJzqYD8I)
* office document (take your pick) C/- Nishang

Persistence mediums:
* Meterpreter (if it works)
* PowerSploit