YoVDO

Powershell and Windows Throw the Best Shell Parties

Offered By: YouTube

Tags

DerbyCon Courses Cybersecurity Courses PowerShell Courses Metasploit Courses Offensive Security Courses Log Management Courses

Course Description

Overview

Explore advanced Windows exploitation techniques in this DerbyCon conference talk on leveraging PowerShell for effective shell parties. Dive into combat-ready shells, essential requirements, and innovative solutions for penetration testing. Learn how to configure and utilize Metasploit Console, manage logs, and perform clean-up operations. Gain insights into PowerShell's capabilities and recap key strategies for enhancing your cybersecurity skillset.

Syllabus

Intro
Background
Combat dead shells
Requirements
The Solution
What Does ItAccomplish
How It Works
Configuration
Default Options
Metasploit Console
Logs
Clean Up
Powershell
Leveraged PowerShell
Recap


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network