Windows Red Team Persistence Techniques - Persistence With PowerShell Empire
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore Windows Red Team persistence techniques for maintaining access to Windows targets using PowerShell Empire in this 45-minute video. Learn about Empire, a post-exploitation framework supporting various operating systems, implemented in PowerShell for Windows and Python 3 for Linux/macOS. Discover feature-rich options to bypass protections and modify for custom evasion, making Empire a popular choice for Command and Control (C2) activities. Gain insights into maintaining persistent access and leveraging the MITRE ATT&CK Framework for effective red team operations. Access additional resources, including a free registration for part 2 of the series, tools like PowerShell Empire, and supplementary materials to enhance your understanding of Windows red team persistence techniques.
Syllabus
Windows Red Team Persistence Techniques | Persistence With PowerShell Empire
Taught by
HackerSploit
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight