Coming mid-July
Cybrary Reimagined.
People first, Security first.
Coming mid-July.
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
People first, Security first.
Valid until October 31. Elevate your skills today!
Start for free
Free

Command and Scripting Interpreter: Windows Command Shell

In this course, you will learn how the native CMD scripting language for Windows can be abused to allow an attacker to execute remote commands, establish persistence and create autorun files to carry out an attack within the Raspberry Robin attack cycle.
1
35
M
Time
intermediate
difficulty
2
ceu/cpe

Course Content

Attack, Detect and Mitigate

20m

What is Technique T1059.003?
Raspberry Robin Lab

0m

What is Technique T1059.003?
Course Description

This course will cover the technique:

> [T1059.003](https://attack.mitre.org/techniques/T1059/003/): Command and Scripting Interpreter: Windows Command Shell. The orchestrator in this whole Raspberry Robin attack cycle is the native Windows command shell or CMD. As you will learn in this course, CMD ensures the autorun scripts are executed once the USB device is plugged into the machine. It is responsible for mounting the USB, initiating the MSI package download, installing, and establishing any future remote C2 connections for the threat actor.

Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

This course is part of a Career Path:
No items found.

Instructed by

Senior Instructor
Matthew Mullins

Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Senior Instructor
Owen Dubiel

Owen is certified in the GIAC GSEC, CompTIA CySA+, and various other vendor-related certifications. He works both as a technical security engineer and as an SME architect instructor in his spare time. Spreading the word of cyber security is a passion of his. Owen lives in Southeast Michigan with his beautiful wife, daughter, and his dog, Thor. In his free time, Owen enjoys watching sports and movies, and spending time with his family.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Command and Scripting Interpreter: Windows Command Shell Certificate of Completion