Offensive PowerShell with Matt Graeber

save
Share and earn Cybytes
Facebook Twitter LinkedIn Email
Overview

In this episode, Kyle talks about how to use Power Shell and defend against it and also mitigation strategies. This introductory video offers the foundation for this topic and Kyle promises a follow-up video on this topic in the future. PowerShell has been around for about ten years and it is part of the Windows environment. It is a Microsoft scripting language that is built on top of the .net framework. It was developed as a framework to automate tasks. In this video, Kyle engages in a discussion with an SME named Matt Graeber to answer questions from interested individuals and offer information. There are five versions of Powershell and is on a variety Windows platforms (e.g, Vista and XP).

In this episode, Kyle talks about how to use Power Shell and defend against it and also mitigation strategies. This introductory video offers the foundation for this topic and Kyle promises a follow-up video on this topic in the future. PowerShell has been around for about ten years and it is part of the Windows environment. It is a Microsoft scripting language that is built on top of the .net framework. It was developed as a framework to automate tasks. In this video, Kyle engages in a discussion with an SME named Matt Graeber to answer questions from interested individuals and offer information. There are five versions of Powershell and is on a variety Windows platforms (e.g, Vista and XP).

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
Follow
2400 Followers
About Huntress Labs
Huntress minimizes the time hackers lurk undetected on computers, laptops, and servers. To accomplish this, Huntress detects and reports malicious applications which are set to automatically run when the system boots up. Although viruses are constantly evolving, the techniques used by hackers to maintain a foothold on computers have hardly changed in 20 years. Unfortunately, existing security products have failed to address these footholds and allow attackers to remain undetected within your network. Huntress focuses on these footholds; finding the compromise before the situation escalates. Our Huntress agent performs “routine health screenings” on each computer in your organization, regardless of where it’s located. The results are sent to the cloud where our analysis engine uses file reputation, frequency analysis, and proprietary algorithms to identify anomalous footholds. After detection, Huntress delivers prioritized remediation recommendations—not alerts—to you and all other affected members within the Huntress community. The Huntress solution is designed to complement any existing security investment to enhance detection efficiency. No duplicated functionality. No duplicated costs. Monitoring Agent Lightweight and transparent: no impact on the user experience or system performance Distributed cloud architecture protects your users in the office, at home, or on the go Analysis Engine Zero false positives and granular classification of malicious, suspicious, and known good applications Generates email based remediation recommendations for instant notification and automated ticket creation Management Console Lightweight and transparent: no impact on the user experience or system performance Distributed cloud architecture protects your users in the office, at home, or on the go

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel