Files
atomic-red-team/Windows/Discovery/Security_Software_Discovery.md
T

39 lines
612 B
Markdown
Raw Normal View History

2017-11-01 16:02:40 -07:00
# Security Software Discovery
2018-01-09 14:53:47 -07:00
MITRE ATT&CK Technique: [T1063](https://attack.mitre.org/wiki/Technique/T1063)
2017-11-01 16:02:40 -07:00
### netsh
2017-11-13 11:02:39 -07:00
netsh.exe advfirewall firewall show all profiles
2017-11-01 16:02:40 -07:00
### tasklist
2017-11-13 11:02:39 -07:00
Input:
2017-11-01 16:02:40 -07:00
tasklist.exe
2017-11-13 11:02:39 -07:00
Input:
tasklist.exe | findstr virus
Input:
tasklist.exe | findstr cb
Input:
tasklist.exe | findstr defender
2017-11-01 16:02:40 -07:00
### PowerShell
powershell.exe get-process | ?{$_.Description -like "*virus*"}
#### CarbonBlack
powershell.exe get-process | ?{$_.Description -like "*carbonblack*"}
#### Windows Defender
powershell.exe get-process | ?{$_.Description -like "*defender*"}