MENU

Fun & Interesting

How to Use PowerShell Event Logs When Threat Hunting or Detecting Cybersecurity Threats

Insane Cyber 1,366 3 years ago
Video Not Working? Fix It Now

Windows' PowerShell event logs provide insight into script execution throughout the life of a malicious script. In this edition of #techtalktuesday we explore the lifecycle of PowerShell events and how you can enhance your threat hunting and cybersecurity program with the PowerShell event logs. Please like and subscribe to support our channel! Follow us on Twitter: https://twitter.com/insaneforensics Follow us on LinkedIn: https://www.linkedin.com/company/insane-forensics Hire us for your next threat hunt: https://insaneforensics.com/ Chapters: 00:00 - Intro 00:19 - Where the PowerShell Event Logs are Stored 01:06 - Lifecycle of PowerShell Event IDs 02:27 - Analyzing Windows Event ID 400 when Powershell Scripts Start 05:25 - Analyzing Windows Event ID 600 when Powershell Providers Load 07:28 - Analyzing Windows Event ID 403 when Powershell Scripts Stop 08:28 - Wrapping Up

Comment