Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.
Unicorn is a tool that penetration testers and ethical hackers can use to generate PowerShell commands to enable the execution of shellcode on Windows hosts. In this course, Execution with Unicorn, you’ll cover how to utilize Unicorn to execute PowerShell downgrade attacks in a red team environment. First, you’ll see how to use Unicorn for a PowerShell attack. Next, you’ll discover Unicorn’s features to create additional attacks. Finally, you’ll learn to simulate client execution exploits by testing payloads on a vulnerable host. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1059.001: Command and Scripting Interpreter: PowerShell, and T1023: Exploitation for Client Execution using Unicorn. More importantly, knowing how these techniques can be used against you will lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Unicorn is a tool that penetration testers and ethical hackers can use to generate PowerShell commands to enable the execution of shellcode on Windows hosts. In this course, Execution with Unicorn, you’ll cover how to utilize Unicorn to execute PowerShell downgrade attacks in a red team environment. First, you’ll see how to use Unicorn for a PowerShell attack. Next, you’ll discover Unicorn’s features to create additional attacks. Finally, you’ll learn to simulate client execution exploits by testing payloads on a vulnerable host. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1059.001: Command and Scripting Interpreter: PowerShell, and T1023: Exploitation for Client Execution using Unicorn. More importantly, knowing how these techniques can be used against you will lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.