Going To Ground with The Windows Scripting Host (WSH)
About a month ago, I was involved in an investigation that revealed
a targeted attacker using an interesting variation of a well-known
persistence mechanism – a technique that is relevant both to
incident responders hunting for evil and …