Windows Red Team Persistence Techniques - Persistence With PowerShell Empire
HackerSploit via YouTube
-
17
-
- Write review
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
AI Engineer - Learn how to integrate AI into software applications
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore Windows Red Team persistence techniques for maintaining access to Windows targets using PowerShell Empire in this 45-minute video. Learn about Empire, a post-exploitation framework supporting various operating systems, implemented in PowerShell for Windows and Python 3 for Linux/macOS. Discover feature-rich options to bypass protections and modify for custom evasion, making Empire a popular choice for Command and Control (C2) activities. Gain insights into maintaining persistent access and leveraging the MITRE ATT&CK Framework for effective red team operations. Access additional resources, including a free registration for part 2 of the series, tools like PowerShell Empire, and supplementary materials to enhance your understanding of Windows red team persistence techniques.
Syllabus
Windows Red Team Persistence Techniques | Persistence With PowerShell Empire
Taught by
HackerSploit