Powershell and You - Using Microsoft's Post Exploitation Language
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Ignore InfoSec Hipsters
PowerShell is for hackers
Gaining Popularity
Why learn PowerShell?
PowerShell Malware
Blue is the new black
Not just a shell
Examples of cmdlets (discovery)
Examples of cmdlets (tasks)
Examples of cmdlets (format)
Examples of cmdlets (output)
PowerShell Providers
Scripting Language
Objects vs Strings
Variables
Arrays
Operators
Conditional Logic
Looping Logic
Net and COM
Net Example
COM Example
C# Wrapper
The Power of the Pipeline
Integrated Scripting Environment
Execution Policy
How Hackers Use PowerShell
PowerShell Golf
Playing Golf (continued)
Staged Approach
Base64 Encoding Trick
Execute
PowerShell and Exploitation
PowerShell and Phishing
Post-Exploitation
Incident Response
Detect Persistence
Defense
Searching for MSF's PsExec
Learn More Books
Questions?
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy Offensive Security Engineering
Udemy Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn