YoVDO

Reinvestigating PowerShell Attacks

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Command and Control Courses

Course Description

Overview

Explore the evolution of PowerShell attacks and defensive strategies in this conference talk from BruCON Security Conference. Delve into the widespread adoption and abuse of PowerShell since 2014, examining how offensive techniques have progressed, including the use of PowerShell Desired State Configuration (DSC) for covert persistence and command and control. Learn about the corresponding advancements in detection and response methods to combat these evolving threats.

Syllabus

04 - BruCON 0x0A - (Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan


Taught by

BruCON Security Conference

Related Courses

AWS IoT Security Series (French)
Amazon Web Services via AWS Skill Builder
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Cybersecurity Kill Chain™
Cybrary
IoT Command and Control (Portuguese)
Amazon Web Services via AWS Skill Builder
IoT Command and Control (Simplified Chinese)
Amazon Web Services via AWS Skill Builder