Explore advanced Windows exploitation techniques in this DerbyCon conference talk on leveraging PowerShell for effective shell parties. Dive into combat-ready shells, essential requirements, and innovative solutions for penetration testing. Learn how to configure and utilize Metasploit Console, manage logs, and perform clean-up operations. Gain insights into PowerShell's capabilities and recap key strategies for enhancing your cybersecurity skillset.
Overview
Syllabus
Intro
Background
Combat dead shells
Requirements
The Solution
What Does ItAccomplish
How It Works
Configuration
Default Options
Metasploit Console
Logs
Clean Up
Powershell
Leveraged PowerShell
Recap