Reinvestigating PowerShell Attacks
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the evolution of PowerShell attacks and defensive strategies in this conference talk from BruCON Security Conference. Delve into the widespread adoption and abuse of PowerShell since 2014, examining how offensive techniques have progressed, including the use of PowerShell Desired State Configuration (DSC) for covert persistence and command and control. Learn about the corresponding advancements in detection and response methods to combat these evolving threats.
Syllabus
04 - BruCON 0x0A - (Re)Investigating Powershell attacks - Matt Hastings and Ryan Kazanciyan
Taught by
BruCON Security Conference
Related Courses
AWS IoT Security Series (French)Amazon Web Services via AWS Skill Builder Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera Cybersecurity Kill Chain™
Cybrary IoT Command and Control (Portuguese)
Amazon Web Services via AWS Skill Builder IoT Command and Control (Simplified Chinese)
Amazon Web Services via AWS Skill Builder