Deepbluecli. The exam features a select subset of the tools covered in the course, similar to real incident response engagements. Deepbluecli

 
The exam features a select subset of the tools covered in the course, similar to real incident response engagementsDeepbluecli F-Secure Countercept has released publicly AMSIDetection which is a tool developed in C# that attempts to detect AMSI bypasses

Open the windows powershell or cmd and just paste the following command. DeepBlueCLI, in concert with Sysmon, enables fast discovery of specific events detected in Windows Security, System, Application, PowerShell, and Sysmon. Table of Contents . And I do mean fast, DeepBlueCLI is quick against saved or archived EVTX files. Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the . . Dedicated to Red Teaming, Purple Teaming, Threat Hunting, Blue Teaming and Threat Intelligence. C. RustyBlue is a Rust implementation of Eric Conrad's DeepBlueCLI, a DFIR tool that detects various Windows attacks by analyzing event logs. 0 329 7 7 Updated Oct 14, 2023. . md","path":"safelists/readme. evtxsmb-password-guessing. . Over 99% of students that use their free retake pass the exam. #5 opened Nov 28, 2017 by ssi0202. Yes, this is public. Code definitions. Table of Contents . Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. DeepBlueCLI ; A PowerShell Module for Threat Hunting via Windows Event Log. Here's a video of my 2016 DerbyCon talk DeepBlueCLI. Top 10 companies in United States by revenue. Install the required packages on server. After Downloaded then extracted the zip file, DeepBlue. \DeepBlue. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. In the “Options” pane, click the button to show Module Name. You switched accounts on another tab or window. Introducing DeepBlueCLI v3. DNS-Exfiltrate Public Python 18 GPL-3. Needs additional testing to validate data is being detected correctly from remote logs. md","path":"safelists/readme. . Here are my slides from my SANS Webcast Introducing DeepBlueCLI v3. You signed in with another tab or window. Code navigation index up-to-date 1. Leave Only Footprints: When Prevention Fails. Sysmon setup . Table of Contents. . {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"LICENSE","path":"LICENSE","contentType":"file"},{"name":"Process-Deepbluecli. This will work in two modes. 0 5 0 0 Updated Jan 19, 2023. ps1 . RedHunt-OS. Patch Management. These are the labs for my Intro class. py. The tool initially act as a beacon and waits for a PowerShell process to start on the system. Q10 What framework was used by attacker?DeepBlueCLI / DeepBlueHash-collector. You may need to configure your antivirus to ignore the DeepBlueCLI directory. ps1 Vboxsvrhhc20193Security. Download it from SANS Institute, a leading provider of. Answer : cmd. DerbyCon 2017: Introducing DeepBlueCLI v2 now available in PowerShell and Python ; Paul's Security Weekly #519; How to become a SANS instructor; DerbyCon 2016: Introducing DeepBlueCLI a PowerShell module for hunt teaming via Windows event logs; Security Onion Con 2016: C2 Phone Home; Long tail analysisIntroducing DeepBlueCLI, a PowerShell module for hunt teaming via Windows event logs Eric Conrad @eric_conrad. Micah Hoffman{"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/deepbluecli":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. 75. 5 contributions on November 13th. Posted by Eric Conrad at 10:16 AM No comments: Sunday, June 11, 2023. DeepBlueCLI: Una Herramienta Para Hacer “Hunting” De Amenazas A Través Del Log De Windows En el mundo del pentesting , del Ethical Hacking y de los ejercicios de Red TeamI run this code to execute PowerShell code from an ASP. Contribute to r3p3r/sans-blue-team-DeepBlueCLI development by creating an account on GitHub. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. evtx log exports from the compromised system – you should analyze these, NOT the Windows logs generated by the lab machine (when using DeepBlueCLI ensure you’re providing the path to these files, stored inside DesktopInvestigation. The only difference is the first parameter. He has over 28 years of information security experience , has created numerous tools and co-authored the CISSP Study Guide. Some capabilities of LOLs are: DLL hijacking, hiding payloads, process dumping, downloading files, bypassing UAC. , what can DeepBlue CLI read and work with ? and more. || Jump into Pay What You Can training for more free labs just like this! the PWYC VM: will go toe-to-toe with the latest attacks: this talk will explore the evidence malware leaves behind, leveraging Windows command line auditing (now natively. freq. evtx path. In the Module Names window, enter * to record all modules. \evtx directory (which contain command-line logs of malicious attacks, among other artifacts). Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the . The threat actors deploy and run the malware using a batch script and WMI or PsExec utilities. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the . {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. EVTX files are not harmful. RedHunt的目标是通过整合攻击者的武库和防御者的工具包来主动识别环境中的威胁,来提供威胁仿真(Threat Emulation)和威胁狩猎所有需求的一站式服务. </p> <h2 tabindex="-1" id="user-content-table-of-contents" dir="auto"><a class="heading. A map is used to convert the EventData (which is the. He has over 28 years of information security experience , has created numerous tools and co-authored the CISSP Study Guide. Invoking it on Security. {"payload":{"allShortcutsEnabled":false,"fileTree":{"READMEs":{"items":[{"name":"README-DeepBlue. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/deepbluecli":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. Contribute to xxnlxzx/Strandjs-ClassLabs development by creating an account on GitHub. ps1 . DeepBlueCLI. Additionally, the acceptable answer format includes milliseconds. Here are links and EVTX files from my SANS Blue Team Summit keynote Leave Only Footprints: When Prevention Fails. Chris Eastwood in Blue Team Labs Online. b. evtx). Moreover, DeepBlueCLI is quick when working with saved or archived EVTX files. Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the . Our open source model ensures our products are always free to use and highly documented, while our international user base and 20 year track record demonstrates our ability to keep up with the. DeepWhite-collector. D. DeepBlueCLI is an open source tool provided in the SANS Blue Team GitHub repository that can analyze EVTX files from the Windows Event Log. || Jump into Pay What You Can training for more free labs just like this! the PWYC VM: You can expect specific command-line logs to be processed including process creation via Windows Security Event ID 4688, as well as Windows PowerShell Event IDs 4103 and 4104, and Sysmon Event ID 1, amonst others. . Hello Eric, So we were practicing in SANS504 with your DeepBlueCLI script and when Chris cleared all the logs then ran the script again we didn't see the event ID "1102" - The Audit Log Was Cleared". You may need to configure your antivirus to ignore the DeepBlueCLI directory. The working solution for this question is that we can DeepBlue. DeepBlueCLIv3 will go toe-to-toe with the latest attacks, analyzing the evidence malware leaves behind, using built-in capabilities such as Windows command. DeepBlueCLI ; Domain Log Review ; Velociraptor ; Firewall Log Review ; Elk In The Cloud ; Elastic Agent ; Sysmon in ELK ; Lima Charlie ; Lima Charlie & Atomic Red ; AC Hunter CE ; Hunting DCSync, Sharepoint and Kerberoasting . Example 1: Basic Usage . This is an under 30 min solution video that helps in finding the answers to the investigation challenge created by Blue Team Labs Online (BTLO) [. This detect is useful since it also reveals the target service name. 1\" width=\"16\" height=\"16\" aria-hidden=\"true. 1. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. Blue Team Level 1 is a practical cybersecurity certification focusing on defensive practices, security. It does take a bit more time to query the running event log service, but no less effective. evtx log. こんにちは、いちび( @itiB_S144)です。 2021年12月25日にWindowsイベントログ解析ツールとして「Hayabusa」がリリースされました🎉. allow for json type input. DeepBlueCLI, in concert with Sysmon, enables fast discovery of specific events detected in Windows Security, System, Application, PowerShell, and Sysmon logs. On average 70% of students pass on their first attempt. ps1. Chainsaw or Hayabusa? Thoughts? In my experience, those using either tool are focused on a tool, rather than their investigative goals; what are they trying to solve, or prove/disprove? Also, I haven't seen anyone that I have seen use either tool write their own detections/filters, based on what they're seeing. To enable module logging: 1. 0 event logs o Available at: • Processes local event logs, or evtx files o Either feed it evtx files, or parse the live logs via Windows Event Log collection. Table of Contents . Upon clicking next you will see the following page. Using DeepBlueCLI investigate the recovered System. ps1","path. It does take a bit more time to query the running event log service, but no less effective. Eric Conrad : WhatsMyName ; OSINT/recon tool for user name enumeration. py. md","contentType":"file. as one of the C2 (Command&Control) defenses available. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. You will apply all of the skills you’ve learned in class, using the same techniques used by Threat Hunting via DeepBlueCLI v3. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. ConvertTo-Json - login failures not output correctly. evtx directory (which contain command-line logs of malicious attacks, among other artifacts). exe or the Elastic Stack. teamDeepBlueCLI – PowerShell Module for Threat Hunting. Event tracing is how a Provider (an application that contains event tracing instrumentation) creates items within the Windows Event Log for a consumer. A tag already exists with the provided branch name. Every incident ends with a lessons learned meeting, and most executive summaries include this bullet point: "Leverage the tools you already paid for". This is how event logs are generated, and is also a way they. evtx directory (which contain command-line logs of malicious attacks, among other artifacts). 38 lines (38 sloc) 1. This is an extremely useful command line utility that can be used to parse Windows Events from a specified EVTX file, or recursively through a specified directory of numerous EVTX files. 1") . Author, Blue Team, Blue Team Tools, Informational, John Strand, Red Team, Webcasts Attack Tactics, Blue Team, DeepBlueCLI, DFIR, Incident Response, john strand, log analysis Webcast: Attack Tactics 7 – The Logs You Are Looking ForSaved searches Use saved searches to filter your results more quicklySysmon Threat Analysis Guide. Study with Quizlet and memorize flashcards containing terms like What is deepblue CLI?, What should you be aware when using the deepblue cli script. A tag already exists with the provided branch name. evtx Go to file Go to file T; Go to line L; Copy path Copy permalink; This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. DeepBlueCLI, in concert with Sysmon, enables fast discovery of specific events detected in Windows Security, System, Application, PowerShell, and Sysmon logs. Output. #13 opened Aug 4, 2019 by tsale. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/Wireshark":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. \evtx\Powershell-Invoke-Obfuscation-encoding-menu. Contribute to r3p3r/sans-blue-team-DeepBlueCLI development by creating an account on GitHub. Powershell local (-log) or remote (-file) arguments shows no results. evtx directory (which contain command-line logs of malicious attacks, among other artifacts). com social media site. DeepBlue. . GitHub is where people build software. View Full List. md","path":"READMEs/README-DeepBlue. evtx log. More information. However, we really believe this event. md","contentType":"file"},{"name":"win10-x64. 4K subscribers in the purpleteamsec community. Eric Conrad : WhatsMyName ; OSINT/recon tool for user name enumeration. py / Jump to. CyLR. md","contentType":"file"},{"name":"win10-x64. Posted by Eric Conrad at 10:16 AM No comments: Sunday, June 11, 2023. RedHunt的目标是通过整合攻击者的武库和防御者的工具包来主动识别环境中的威胁,来提供威胁仿真(Threat Emulation)和威胁狩猎所有需求的一站式服务. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/deepbluecli":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. Sysmon is required:. Twitter: @eric_conrad. Sigma - Community based generic SIEM rules. I'm running tests on a 12-Core AMD Ryzen. DeepBlueCLI reviews and mentions. The Ultimate Guide to the CSSLP covers everything you need to know about the secure software development professional’s certification. #19 opened Dec 16, 2020 by GlennGuillot. evtx. CSI Linux. Questions and Answers (Coming Soon) Using DeepBlueCLI, investigate the recovered Security log (Security. 2019 13:22:46 Log : Security EventID : 4648 Message : Distributed Account Explicit. Event Log Explorer. allow for json type input. {"payload":{"allShortcutsEnabled":false,"fileTree":{"safelists":{"items":[{"name":"readme. py. It was created by Eric Conrad and it is available on GitHub. With the help of PowerShell and the Convert-EventLogRecord function from Jeffery Hicks, it is much easier to search for events in the Event Log than with the Event Viewer or the Get-WinEvent cmdlet. Codespaces. The only one that worked for me also works only on W. py. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/WindowsCLI":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. Host and manage packages. Why? No EXE for antivirus or HIPS to squash, nothing saved to the filesystem, sites that use application whitelisting allow PowerShell, and little to no default logging. evtx Distributed Account Explicit Credential Use (Password Spray Attack) The use of multiple user account access attempts with explicit credentials is an indicator of a password spray attack. md","path":"READMEs/README-DeepBlue. Posted by Eric Conrad at 10:16 AM No comments: Sunday, June 11, 2023. as one of the C2 (Command&Control) defenses available. First, we confirm that the service is hidden: PS C: oolsDeepBlueCLI> Get-Service | Select-Object Name | Select-String -Pattern 'SWCUEngine' PS C: oolsDeepBlueCLI>. DeepBlueCLI / DeepBlue. Every incident ends with a lessons learned meeting, and most executive summaries include this bullet point: "Leverage the tools you already paid for"Are you. 2. DeepBlueCLI helped this one a lot because it said that the use of pipe in cmd is to communicate between processes and metasploit use the named pipe impersonation to execute a meterpreter scriptQ3 Using DeepBlueCLI investigate the recovered System. At regular intervals a comparison hash is performed on the read only code section of the amsi. Varonis debuts trailblazing features for securing Salesforce. Chainsaw or Hayabusa? Thoughts? In my experience, those using either tool are focused on a tool, rather than their investigative goals; what are they trying to solve, or prove/disprove? Also, I haven't seen anyone that I have seen use either tool write their own detections/filters, based on what they're seeing. Micah Hoffman : untappdScraper ; OSINT tool for scraping data from the untappd. evtx, . Over 99% of students that use their free retake pass the exam. This allows them to blend in with regular network activity and remain hidden. What is the name of the suspicious service created? Whenever a event happens that causes the state of the system to change , Like if a service is created or a task was scheduled it falls under System logs category in windows. It does take a bit more time to query the running event log service, but no less effective. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the . DeepBlueCLI. For single core performance, it is both the fastest and the only cross-platform parser than supports both xml and JSON outputs. At RSA Conference 2020, in this video The 5 Most Dangerous New Attack Techniques and How to Counter Them, Ed Skoudis presented a way to look for log anomalies – DeepBlueCLI by Eric Conrad, et al. Belkasoft’s RamCapturer. ConvertTo-Json - login failures not output correctly. Given Scenario, A Windows. DeepBlue. No contributions on November 27th. EVTX files are not harmful. II. For my instance I will be calling it "security-development. py. Followers. In the situation above, the attacker is trying to guess the password for the Administrator account. Hence, a higher number means a better DeepBlueCLI alternative or higher similarity. What is the name of the suspicious service created? Whenever a event happens that causes the state of the system to change , Like if a service is created or a task was scheduled it falls under System logs category in windows. This post focus on Microsoft Sentinel and Sysmon 4 Blue Teamers. DeepBlueCLI, in concert with Sysmon, enables fast discovery of specific events detected in Windows Security, System, Application, PowerShell, and Sysmon logs. To fix this it appears that passing the ipv4 address will r. Sysmon is required:. md","path":"READMEs/README-DeepBlue. evtx directory (which contain command-line logs of malicious attacks, among other artifacts). ConvertTo-Json - login failures not output correctly. Service and task creation are not neccesserily. In the “Options” pane, click the button to show Module Name. DeepBlueCLI is available here. The only difference is the first parameter. DeepBlueCLI DeepBlueCLI is an open-source threat hunting tool that is available in the SANS Blue Team GitHub repository and can analyse EVTX files from the Windows Event Log. Intermediate. . System Monitor ( Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. The working solution for this question is that we can DeepBlue. md at main · EvolvingSysadmin/Blue-Team-ToolkitGet-winevent will accept the computer name parameter but for some reason DNS resolution inside the parameter breaks the detection engine. . Thursday, 29 Jun 2023 1:00PM EDT (29 Jun 2023 17:00 UTC) Speaker: Eric Conrad. Note A security identifier (SID) is a unique value of variable length used to identify a trustee. A handy tip was shared online this week, showing how you can use PowerShell to monitor changes to the Windows Registry over time. In the “Options” pane, click the button to show Module Name. Process creation. a. . IV. . {"payload":{"allShortcutsEnabled":false,"fileTree":{"evtx":{"items":[{"name":"Powershell-Invoke-Obfuscation-encoding-menu. You may need to configure your antivirus to ignore the DeepBlueCLI directory. 0 event logs o Available at: Processes local event logs, or evtx files o Either feed it evtx files, or parse the live logs via Windows Event Log collection o Can process logs centrally on a. ForenseeventosExtraidossecurity. Targets; Defense Spotlight: DeepBlueCLI SECTION 6: Capture-the-Flag Event Over the years, the security industry has become smarter and more effective in stopping attackers. ps1 . py Public Mark Baggett's (@MarkBaggett - GSE #15, SANS. DeepBlueCLI / DeepBlueHash-checker. If it ask for further confirmation just enter YesSet-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy RemoteSigned. Sysmon setup . DeepBlueCLI is available here. py. {"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. 🎯 Hunt for threats using Sigma detection rules and custom Chainsaw detection rules. The skills this SEC504 course develops are highly particular and especially valuable for those in roles where regulatory compliance and legal requirements are important. Let's get started by opening a Terminal as Administrator. Designed for parsing evtx files on Unix/Linux. 対象のファイルを確認したところ DeepBlueCLIevtxmany-events-system. The last one was on 2023-02-15. #5 opened Nov 28, 2017 by ssi0202. #20 opened Apr 7, 2021 by dhammond22222. ps1 -log system # if the script is not running, then we need to bypass the execution policy Set-ExecutionPolicy Bypass -Scope CurrentUser First thing we need to do is open the security. On average 70% of students pass on their first attempt. Leave Only Footprints: When Prevention Fails. 基于Django构建的Windows环境下. Detected events: Suspicious account behavior, Service auditing. DeepBlueCLI is a PowerShell Module for Threat Hunting via Windows Event Logs. Optional: To log only specific modules, specify them here. {"payload":{"allShortcutsEnabled":false,"fileTree":{"READMEs":{"items":[{"name":"README-DeepBlue. || Jump into Pay What You Can training for more free labs just like this! the PWYC VM: Public PowerShell 1,945 GPL-3. . EVTX files are not harmful. You may need to configure your antivirus to ignore the DeepBlueCLI directory. You either need to provide -log parameter then log name or you need to show the . 📅 Create execution timelines by analysing Shimcache artefacts and enriching them with Amcache data. Give the following command: Set-ExecutionPolicy RemoteSigned or Set-ExecutionPolicy Bypass. Usage This seems to work on the example file: [mfred@localhost DeepBlueCLI]$ python DeepBlue. evtx and System. Do you want to learn how to play Backdoors & Breaches, an incident response card game that simulates cyberattacks and defenses? Download this visual guide from Black Hills Information Security and get ready to test your skills and knowledge in a. sys','*. Popular Searches Council of Better Business Bureaus Inc Conrad DeepBlueCLI SIC Code 82,824 NAICS Code 61,611 Show More. It does take a bit more time to query the running event log service, but no less effective. below should appear{"payload":{"allShortcutsEnabled":false,"fileTree":{"":{"items":[{"name":"READMEs","path":"READMEs","contentType":"directory"},{"name":"evtx","path":"evtx. 1, or Microsoft Security Essentials for Windows 7 and Windows Vista. Less than 1 hour of material. By analyzing event logging data, DeepBlueCLI can recognize unusual activity or traits. evtx","path":"evtx/Powershell-Invoke. Description Get-WinEvent fails to retrieve the event description for Event 7023 and EventLogException is thrown. There are 12 alerts indicating Password Spray Attacks. Investigate the Security. You switched accounts on another tab or window. Portspoof, when run, listens on a single port. py. {"payload":{"allShortcutsEnabled":false,"fileTree":{"evtx":{"items":[{"name":"Powershell-Invoke-Obfuscation-encoding-menu. This is very much part of what a full UEBA solution does:</p> <p dir="auto">PS C: oolsDeepBlueCLI-master><code>. Ullrich, Ph. ” It is licensed under the Apache 2. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/PasswordSpray":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools. . Open the powershell in admin mode. And I do mean fast, DeepBlueCLI is quick against saved or archived EVTX files. UsageThis seems to work on the example file: [mfred@localhost DeepBlueCLI]$ python DeepBlue. evtx file and review its contents. III. You may need to configure your antivirus to ignore the DeepBlueCLI directory. . evtx directory (which contain command-line logs of malicious attacks, among other artifacts). One of the most effective ways to stop an adversary is{"payload":{"allShortcutsEnabled":false,"fileTree":{"evtx":{"items":[{"name":"Powershell-Invoke-Obfuscation-encoding-menu. deepblue at backshore dot net. Make sure to enter the name of your deployment and click "Create Deployment". 本記事では2/23 (日)~2/28 (金)サンフランシスコで開催された、RSA Conferenceの参加レポートとなります。. DNS-Exfiltrate Public Python 18 GPL-3. A responder must gather evidence, artifacts, and data about the compromised. First, download DeepBlueCLI and Posh-SYSLOG, unzipping the files to a local directory. You may need to configure your antivirus to ignore the DeepBlueCLI directory. You will apply all of the skills you’ve learned in class, using the same techniques used by{"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/Velociraptor":{"items":[{"name":"attachment","path":"IntroClassFiles/Tools. Others are fine; DeepBlueCLI will use SHA256. Table of Contents . {"payload":{"allShortcutsEnabled":false,"fileTree":{"evtx":{"items":[{"name":"Powershell-Invoke-Obfuscation-encoding-menu. You signed out in another tab or window. To enable module logging: 1. DeepBlueCLI is a tool used for managing and analyzing security events in Splunk. 9. py. 11. Identify the malicious executable downloaded that was used to gain a Meterpreter reverse shell, between 10:30 and 10:50. Linux, macOS, Windows, ARM, and containers. evtx","path":"evtx/Powershell-Invoke. {"payload":{"allShortcutsEnabled":false,"fileTree":{"IntroClassFiles/Tools/IntroClass/deepbluecli":{"items":[{"name":"attachments","path":"IntroClassFiles/Tools.