Completed
Playing Golf (continued)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Powershell and You - Using Microsoft's Post Exploitation Language
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Ignore InfoSec Hipsters
- 3 PowerShell is for hackers
- 4 Gaining Popularity
- 5 Why learn PowerShell?
- 6 PowerShell Malware
- 7 Blue is the new black
- 8 Not just a shell
- 9 Examples of cmdlets (discovery)
- 10 Examples of cmdlets (tasks)
- 11 Examples of cmdlets (format)
- 12 Examples of cmdlets (output)
- 13 PowerShell Providers
- 14 Scripting Language
- 15 Objects vs Strings
- 16 Variables
- 17 Arrays
- 18 Operators
- 19 Conditional Logic
- 20 Looping Logic
- 21 Net and COM
- 22 Net Example
- 23 COM Example
- 24 C# Wrapper
- 25 The Power of the Pipeline
- 26 Integrated Scripting Environment
- 27 Execution Policy
- 28 How Hackers Use PowerShell
- 29 PowerShell Golf
- 30 Playing Golf (continued)
- 31 Staged Approach
- 32 Base64 Encoding Trick
- 33 Execute
- 34 PowerShell and Exploitation
- 35 PowerShell and Phishing
- 36 Post-Exploitation
- 37 Incident Response
- 38 Detect Persistence
- 39 Defense
- 40 Searching for MSF's PsExec
- 41 Learn More Books
- 42 Questions?