ݺߣ

ݺߣShare a Scribd company logo
Powershell’in Karanlık Yüzü
Sistemlere Sızma, Bırakılan İzler, Phant0m
whoami
• Halil DALABASMAZ
• Sr. Penetration Tester & Instructor @ BGA Security
• C|EH, OSCP, OSWP, OSCE
• artofpwn.com
• Twitter @hlldz
• Linkedin @hlldz
• Exploit-DB @Halil DALABASMAZ
>_ Powershell
• Microsoft tarafından Windows komut satırı cmd.exe ve Windows
Script Host'a alternatif olarak geliştirilen yeni nesil bir komut satırı
uygulamasıdır.
>_ Powershell
>_ Karanlık Taraf
>_ Neden
• Signed, Legal
• Varsayılan Olarak Yüklü
• Şifreli Trafik İle Uzaktan Erişim
İmkanı
• Anti-Forensic Friendly
• Anti-Application Whitelisting
Friendly
• Script-Based Malware Bağışıklığı
• Obfuscation Kolaylığı
>_ Execution Policy
• Restricted
• RemoteSigned
• AllSigned
• Unrestricted
• Bypass
>_ Projeler
• Powershell Empire
• PowerSploit
• Nishang
• PowerOPS
• p0wnedShell
• Inveigh
• Unicorn
>_ Powershell > Powershell.exe
>_ Bırakılan İzler
• Kayıt Defteri
• Ağ Trafiği
• Memory
• Prefecth
• Event Log
>_ Kayıt Defteri
• Kalıcı Olmak (Persistent)
>_ Ağ Trafiği
• WinRM, Windows Remote
Management
• Powershell Remoting
• HTTP 5985, HTTPS 5986
>_ Memory
• Powershell Remoting?
• svchost.exe - DCOM Server
Process
• DCOMLaunch
• C:WindowsSystem32wsmpro
vhost.exe
>_ Prefecth
• C:WindowsPrefetch
• *.pf
>_ Windows Event Log
• Powershell 3.0 +
• Windows PowerShell.evtx
• Microsoft-Windows-
PowerShell%4Operational.evtx
• Microsoft-Windows-
PowerShell%4Analytic.etl
• Microsoft-Windows-
WinRM%4Operational.evtx
• • Microsoft-Windows-
WinRM%4Analytic.etl
>_ Phant0m
• İz bırakmamak!?
• Windows Event Log
>_ svchost.exe
>_ Windows Event Log
>_ Demo
1. .DOC (Macro)
2. MS16-032 LPE
3. Phant0m
4. Meterpreter

More Related Content

Powershell'in Karanlık Yüzü