Desired State Configuration (DSC) is a core component of Microsoft's new enterprise management technology that provides unique opportunities for administrators and attackers alike. It's designed to monitor and maintain the configuration of a set of systems - even over the internet - with no Active Directory required. But in the wrong hands, a creative adversary can hijack DSC as an effective means of command-and-control using nothing but PowerShell scripts and built-in Windows features.
First, we'll demonstrate how to use DSC to infect systems and serve as a covert persistence mechanism for malware. After covering these intrusion scenarios, we'll tackle the topic from the perspective of a defender or incident responder. We'll illustrate the signs that DSC might be used on a compromised system, and how to investigate the forensic evidence it leaves behind.