Powershell and You - Using Microsoft's Post Exploitation Language

Powershell and You - Using Microsoft's Post Exploitation Language

via YouTube Direct link

Playing Golf (continued)

30 of 42

30 of 42

Playing Golf (continued)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Powershell and You - Using Microsoft's Post Exploitation Language

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Ignore InfoSec Hipsters
  3. 3 PowerShell is for hackers
  4. 4 Gaining Popularity
  5. 5 Why learn PowerShell?
  6. 6 PowerShell Malware
  7. 7 Blue is the new black
  8. 8 Not just a shell
  9. 9 Examples of cmdlets (discovery)
  10. 10 Examples of cmdlets (tasks)
  11. 11 Examples of cmdlets (format)
  12. 12 Examples of cmdlets (output)
  13. 13 PowerShell Providers
  14. 14 Scripting Language
  15. 15 Objects vs Strings
  16. 16 Variables
  17. 17 Arrays
  18. 18 Operators
  19. 19 Conditional Logic
  20. 20 Looping Logic
  21. 21 Net and COM
  22. 22 Net Example
  23. 23 COM Example
  24. 24 C# Wrapper
  25. 25 The Power of the Pipeline
  26. 26 Integrated Scripting Environment
  27. 27 Execution Policy
  28. 28 How Hackers Use PowerShell
  29. 29 PowerShell Golf
  30. 30 Playing Golf (continued)
  31. 31 Staged Approach
  32. 32 Base64 Encoding Trick
  33. 33 Execute
  34. 34 PowerShell and Exploitation
  35. 35 PowerShell and Phishing
  36. 36 Post-Exploitation
  37. 37 Incident Response
  38. 38 Detect Persistence
  39. 39 Defense
  40. 40 Searching for MSF's PsExec
  41. 41 Learn More Books
  42. 42 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.