Command and Scripting Interpreter: Windows Command Shell

Course Content
This course will cover the technique:
> [T1059.003](https://attack.mitre.org/techniques/T1059/003/): Command and Scripting Interpreter: Windows Command Shell. The orchestrator in this whole Raspberry Robin attack cycle is the native Windows command shell or CMD. As you will learn in this course, CMD ensures the autorun scripts are executed once the USB device is plugged into the machine. It is responsible for mounting the USB, initiating the MSI package download, installing, and establishing any future remote C2 connections for the threat actor.Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.