Windows Command-Line Obfuscation

Por um escritor misterioso
Last updated 18 maio 2024
Windows Command-Line Obfuscation
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due to the number of variations. This post shows how more than 40 often-used, built-in Windows applications are vulnerable to forms of command-line obfuscation, and presents a tool for analysing other executables.
Windows Command-Line Obfuscation
Command-Line Obfuscation
Windows Command-Line Obfuscation
Windows Command-Line Obfuscation
Windows Command-Line Obfuscation
Invoke-Obfuscation – Liam Cleary [MVP Alumni and MCT]
Windows Command-Line Obfuscation
Deconstructing PowerShell Obfuscation in Malspam Campaigns
Windows Command-Line Obfuscation
Safelist Command Obfuscation With Symbols in Secure Endpoint
Windows Command-Line Obfuscation
Using Deep Learning to Better Detect Command Obfuscation
Windows Command-Line Obfuscation
PowerShell Obfuscation: Stealth Through Confusion, Part I
Windows Command-Line Obfuscation
PowerShell Obfuscation using SecureString
Windows Command-Line Obfuscation
Villain: Evading Windows Defender, by Cybertech Maven
Windows Command-Line Obfuscation
Florian Roth on X: Sigma rule to detect suspicious Unicode
Windows Command-Line Obfuscation
Flerken - Obfuscated Command Detection Tool - vulnerability
Windows Command-Line Obfuscation
Obfuscating PowerShell Commands – Liam Cleary [MVP Alumni and MCT]
Windows Command-Line Obfuscation
Obfuscated Command Line Detection Using Machine Learning
Windows Command-Line Obfuscation
Exploring Windows Command-Line Obfuscation

© 2014-2024 miaad.org. All rights reserved.