The Cyber Threat Perspective

Episode 50: How Attackers Use PowerShell

SecurIT360 Season 1 Episode 50

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 28:15

In this episode Spencer and Darrius discuss how cyber adversaries harness the power of PowerShell to orchestrate their malicious activities. Stay tuned for the next episode where we talk about security automation with PowerShell.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.