Powershell and You - Using Microsoft's Post Exploitation Language
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Ignore InfoSec Hipsters
PowerShell is for hackers
Gaining Popularity
Why learn PowerShell?
PowerShell Malware
Blue is the new black
Not just a shell
Examples of cmdlets (discovery)
Examples of cmdlets (tasks)
Examples of cmdlets (format)
Examples of cmdlets (output)
PowerShell Providers
Scripting Language
Objects vs Strings
Variables
Arrays
Operators
Conditional Logic
Looping Logic
Net and COM
Net Example
COM Example
C# Wrapper
The Power of the Pipeline
Integrated Scripting Environment
Execution Policy
How Hackers Use PowerShell
PowerShell Golf
Playing Golf (continued)
Staged Approach
Base64 Encoding Trick
Execute
PowerShell and Exploitation
PowerShell and Phishing
Post-Exploitation
Incident Response
Detect Persistence
Defense
Searching for MSF's PsExec
Learn More Books
Questions?
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network