Windows Red Team Persistence Techniques - Persistence With PowerShell Empire
HackerSploit via YouTube
-
10
-
- Write review
Overview
Explore Windows Red Team persistence techniques for maintaining access to Windows targets using PowerShell Empire in this 45-minute video. Learn about Empire, a post-exploitation framework supporting various operating systems, implemented in PowerShell for Windows and Python 3 for Linux/macOS. Discover feature-rich options to bypass protections and modify for custom evasion, making Empire a popular choice for Command and Control (C2) activities. Gain insights into maintaining persistent access and leveraging the MITRE ATT&CK Framework for effective red team operations. Access additional resources, including a free registration for part 2 of the series, tools like PowerShell Empire, and supplementary materials to enhance your understanding of Windows red team persistence techniques.
Syllabus
Windows Red Team Persistence Techniques | Persistence With PowerShell Empire
Taught by
HackerSploit