YoVDO

Reinvestigating PowerShell Attacks

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Command and Control Courses

Course Description

Overview

Explore the evolution of PowerShell attacks and defensive strategies in this conference talk from BruCON Security Conference. Delve into the widespread adoption and abuse of PowerShell since 2014, examining how offensive techniques have progressed, including the use of PowerShell Desired State Configuration (DSC) for covert persistence and command and control. Learn about the corresponding advancements in detection and response methods to combat these evolving threats.

Syllabus

04 - BruCON 0x0A - (Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan


Taught by

BruCON Security Conference

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera