YoVDO

Windows Red Team Persistence Techniques - Persistence With PowerShell Empire

Offered By: HackerSploit via YouTube

Tags

Red Team Courses Penetration Testing Courses Offensive Security Courses

Course Description

Overview

Explore Windows Red Team persistence techniques for maintaining access to Windows targets using PowerShell Empire in this 45-minute video. Learn about Empire, a post-exploitation framework supporting various operating systems, implemented in PowerShell for Windows and Python 3 for Linux/macOS. Discover feature-rich options to bypass protections and modify for custom evasion, making Empire a popular choice for Command and Control (C2) activities. Gain insights into maintaining persistent access and leveraging the MITRE ATT&CK Framework for effective red team operations. Access additional resources, including a free registration for part 2 of the series, tools like PowerShell Empire, and supplementary materials to enhance your understanding of Windows red team persistence techniques.

Syllabus

Windows Red Team Persistence Techniques | Persistence With PowerShell Empire


Taught by

HackerSploit

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent