YoVDO

Windows Red Team Persistence Techniques - Persistence With PowerShell Empire

Offered By: HackerSploit via YouTube

Tags

Red Team Courses Penetration Testing Courses Offensive Security Courses

Course Description

Overview

Explore Windows Red Team persistence techniques for maintaining access to Windows targets using PowerShell Empire in this 45-minute video. Learn about Empire, a post-exploitation framework supporting various operating systems, implemented in PowerShell for Windows and Python 3 for Linux/macOS. Discover feature-rich options to bypass protections and modify for custom evasion, making Empire a popular choice for Command and Control (C2) activities. Gain insights into maintaining persistent access and leveraging the MITRE ATT&CK Framework for effective red team operations. Access additional resources, including a free registration for part 2 of the series, tools like PowerShell Empire, and supplementary materials to enhance your understanding of Windows red team persistence techniques.

Syllabus

Windows Red Team Persistence Techniques | Persistence With PowerShell Empire


Taught by

HackerSploit

Related Courses

Basics of Network Security
Coventry University via FutureLearn
Offensive Security Engineering
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy
Hack Like a Pro - Ethical Hacking from A to Z
Udemy
Exfiltration with Dnscat2
Pluralsight