Things‐I‐want‐to‐know‐more‐about‐ops 401 class 26 reading 26 - reedraheem/Things-I-want-to-know-more-about- GitHub Wiki
Readings: Remote Code Execution
You just got a new job as a Cyber Threat Analyst, how would you explain your role to a family member?
I use special tools and techniques to analyze data and monitor the internet for any unusual behavior. It's a bit like being a detective in a spy movie, trying to stay one step ahead of the bad guys.
Explain what makes PowerShell such an effective attack vector.
Living off the Land (LOL) Attacks: PowerShell is often used in "Living off the Land" attacks, where attackers utilize legitimate tools available on the system to carry out malicious activities. Since PowerShell is native to Windows, its usage might not raise immediate suspicion from traditional security solutions.
What are two things you can do to mitigate attacks that leverage PowerShell?
Application whitelisting is a security strategy that allows only authorized and trusted applications to run on a system, while blocking all others, including potentially malicious scripts.By implementing application whitelisting, organizations can prevent unauthorized execution of PowerShell scripts and other binaries that are not essential for legitimate business operations.Regular Patching and Updating: Keep operating systems and software up to date with the latest security patches and updates. Many attacks leverage known vulnerabilities that can be mitigated through timely patching.