Upload files to "Modules/Knowledge/Powershell"

This commit is contained in:
2024-11-30 00:53:52 -05:00
parent b679b5b48a
commit 374c4fc736
2 changed files with 61 additions and 0 deletions

View File

@ -0,0 +1,34 @@
def get_content():
"""
Returns structured content for PowerShell, registry artifacts, and related forensics.
"""
return [
{
"title": "PowerShell v5 Logging",
"content": """
- Automatically logs suspicious scripts for analysis.
- ConsoleHost_history.txt records the last 4096 PowerShell commands.
"""
},
{
"title": "Registry Artifacts",
"content": """
- MountPoints2: Lists all systems a user account connects to.
- ShimCache: Backward compatibility artifact, shows whether an application has executed.
- Windows Error Reporting: Provides SHA1 hashes of malware, especially for poorly written samples.
"""
},
{
"title": "AppCompatCache Tracking",
"content": """
- Tracks full path and last modification time of executables on Windows 10+ systems.
"""
},
{
"title": "Amcache Analysis",
"content": """
- Logs executable name/path, first execution time, and SHA1 hash (remove leading zeros for VirusTotal lookup).
- Important Note: Entries do not always indicate execution.
"""
}
]

View File

@ -0,0 +1,27 @@
def get_content():
"""
Returns structured content for analyzing PowerShell activity.
"""
return [
{
"title": "PowerShell Logging",
"content": """
- Command logs: ConsoleHost_history.txt (last 4096 commands).
- Operational logs: Script block logging (4104).
"""
},
{
"title": "Remote Execution",
"content": """
- Enter-PSSession: Interactive remote shell.
- Invoke-Command: Executes parallel tasks remotely.
"""
},
{
"title": "Key Features of PowerShell",
"content": """
- Automation of complex tasks.
- Logs suspicious script activities automatically (v5 and later).
"""
}
]