Mobile Application Assessment with Chris Crowley, SANS Institute – Paul’s Security Weekly #529

Chris Crowley is a SANS instructor and independent consultant based in the Washington, D.C. area. Mr. Crowley overviews his approach to keeping mobile applications secure in this technical segment! Full Show Notes Subscribe to YouTube Channel
The post Mobile Application Assessment with Chris Crowley, SANS Institute – Paul’s Security Weekly #529 appeared first on Security Weekly.

Link: http://feedproxy.google.com/~r/securityweekly/Lviv/~3/l3Z4K0zBXDM/

NorkNork – Powershell Empire Persistence Finder

This script was designed to identify Powershell Empire persistence payloads on Windows systems.It currently supports checks for these persistence methods:Scheduled TasksAuto-runWMI subscriptionsSecurity Support providerEase of Access Center backdoorsMachine account password disableINSTALL:You can run this script with python 2.7 or by downloading the pyinstaller exe. Run the binary or the script in a powershell window.USAGE:Running the python scriptPS C:\Users\>python norknork.pyRunning the binaryPS C:\Users\> .\norknork.exeSave the data into a text filePS C:\Users\> .\norknork.exe > results.txtFAQQ: Why didn’t you just create this in powershell?A: I was too lazy to learn powershell.Q: Will this find all persistence methods?A: No, only those in Powershell Emprire and only those that perist through reboots.Download NorkNork

Link: http://feedproxy.google.com/~r/PentestTools/~3/OrLAzkwRqRk/norknork-powershell-empire-persistence.html