Teymur Kheirkhabarov

Head of Cyber Defense Center, BI.ZONE

About speaker

Teymur is engaged in paper and practical cybersecurity for over 7 years. Head of Cyber Defense Center at BI.Zone. Former Had of SOC R&D at Kaspersky Lab and Head of Information Security Department at industrial enterprise, as well as a system administrator with many years of experience. He obtained the Masters Degree from Siberian State Aerospace University (where he was also giving lectures on information security). Teymur was a speaker at Positive Hack Days, ZeroNights and OffZONE conferences.

June 17
13:00 — 14:00
First Track
PowerShell is the favorit tool of IT guys, who are responsible for administration of Windows infrastructures. It allows them to manage differen services of the operating system and automate almost anything. But along with administrators, PowerShell also is liked by attackers and malware authors. The reason PowerShell is so attractive for adversaries is quite obvious: it has been included in essentially every Windows operating system by default for a decade, provides access to Windows API, and is rarely constrained, thus allowing adversaries to perform different tasks without risking being blocked. ttackers can use PowerShell to direct the execution of a local script, retrieve and execute remote resources using various network protocols, encode payloads passed via the command line, or load PowerShell into other processes.

Because of so prevalence of PowerShell among adversaries for Threat Hunters it is very important to be able to detect malicious uses of PowerShell and defend against it. In the presentation author is going to demostrate an approaches for detection of PowerShell abuses based on different event sources like native Windows logging capabilities as well as usage of additional tools, like Sysmon or EDR solutions. How to collect traces of using PowerShell, how to filter out false positives, and how to find evidence of malicious uses among the remaining after filtering volume of events — all these questions will be answered in the talk for present and future threat hunters.