Given access to compromised or at-risk systems with local administrator/root permissions, and provided with an approved software baseline or whitelist, the operator will identify and remove unauthorized software or attacker tools to prevent persistence or further exploitation.
Operator Note: Unapproved or malicious tools can provide threat actors with remote access, credential theft capabilities, or data exfiltration paths. During containment, unauthorized software should be removed or disabled carefully to preserve forensic evidence and avoid business disruption.
All unapproved or attacker-deployed software is removed or isolated from the environment, and removal actions are documented and validated.
Get-WmiObject -Class Win32_Product | Select-Object Name, Version
Get-Process | Select-Object Name, Path
Operator Note: Look for non-standard paths (AppData, Temp, C:\Users).
dpkg -l
rpm -qa
ps aux | less
Operator Note: Use
lsof
ornetstat
to identify software with network activity.
system_profiler SPApplicationsDataType
ps aux
Get-WmiObject -Class Win32_Product -Filter "Name='ToolName'" | ForEach-Object { $_.Uninstall() }
apt-get remove --purge packagename
yum remove packagename
rm /path/to/binary
Operator Note: Retain a forensic copy before removal if necessary.
sudo rm -rf /Applications/Tool.app
Get-WmiObject -Class Win32_Product | Where-Object { $_.Name -notmatch "Microsoft|Adobe|VMware|Cisco" } | Select-Object Name, Version
Operator Note: Adjust exclusions based on organization whitelist.
Tool | Platform | Use Case |
---|---|---|
PowerShell + WMI | Windows | Installed software and removal |
Autoruns (Sysinternals) | Windows | Identify software running at startup |
dpkg, rpm, yum, apt | Linux | Package management and removal |
ps, lsof, netstat | Linux/macOS | Running process identification |
Manual removal | All | Remove binaries or application files |
Windows PowerShell Get-WmiObject
Linux Package Management Guide
Sysinternals Autoruns
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Fully generated operator guide for identifying and removing unapproved software across OS platforms | Leo |