Главная
Study mode:
on
1
Intro
2
Background
3
Combat dead shells
4
Requirements
5
The Solution
6
What Does ItAccomplish
7
How It Works
8
Configuration
9
Default Options
10
Metasploit Console
11
Logs
12
Clean Up
13
Powershell
14
Leveraged PowerShell
15
Recap
Description:
Explore advanced Windows exploitation techniques in this DerbyCon conference talk on leveraging PowerShell for effective shell parties. Dive into combat-ready shells, essential requirements, and innovative solutions for penetration testing. Learn how to configure and utilize Metasploit Console, manage logs, and perform clean-up operations. Gain insights into PowerShell's capabilities and recap key strategies for enhancing your cybersecurity skillset.

Powershell and Windows Throw the Best Shell Parties

Add to list
0:00 / 0:00